Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with Dumpstech

Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?

Options:

A.

Using round-robin load balancing

B.

Rerouting traffic to the mitigation services

C.

Having multiple endpoints

D.

Scaling the receiving application

Questions # 2:

Which management process involves multiple key holders, each with access to a portion of the information?

Options:

A.

Recovery

B.

Revocation

C.

Distribution

D.

Escrow

Questions # 3:

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

Options:

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

Questions # 4:

Which regulation restricts the government from forcing a cloud service provider to disclose customer data?

Options:

A.

GLBA

B.

SOX

C.

SCA

D.

ECPA

Questions # 5:

What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?

Options:

A.

Database replication

B.

Storage array replication

C.

Web application firewalls

D.

Backup generators

Questions # 6:

Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?

Options:

A.

Guest escape

B.

Information bleed

C.

Software interoperability

D.

Web application security

Questions # 7:

Which data retention policy addresses how long data must be retained to meet regulatory requirements?

Options:

A.

Formats

B.

Classification

C.

Retrieval

D.

Periods

Questions # 8:

Which means of access management is used to determine whether someone is a legitimate user?

Options:

A.

Authentication

B.

Authorization

C.

Federation

D.

Policy management

Questions # 9:

Which security device allows customers to redirect traffic?

Options:

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

Questions # 10:

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions