Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 204 questions

Which action should be taken to ensure that unencrypted network traffic is protected?

A.

Data should be transmitted using the secure socket layer (SSL) protocol.

B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).

C.

Data should be transmitted using generic routing encapsulation (GRE).

D.

Data should be transmitted using the transport layer security (TLS) protocol.

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Which type of cloud security vulnerability is static application security testing (SAST) likely to find?

A.

Software misconfiguration

B.

Embedded credentials

C.

Hypervisor vulnerabilities

D.

Run-time vulnerabilities

Which country lacks a national law assuring individual personal privacy?

A.

New Zealand

B.

Canada

C.

United States

D.

Israel

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Which data source provides auditability and traceability for event investigation as well as documentation?

A.

Block storage

B.

Object storage

C.

Database logs

D.

Database rows

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Which logical design model includes the foundations of a secure computing system, such as computing, networking, and storage?

A.

Infrastructure

B.

Infostructure

C.

Metastructure

D.

Applistructure

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

A.

XML

B.

Database

C.

Object-based

D.

Volume

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Which characteristic could affect the audit process for a customer of a cloud service provider?

A.

Lack of physical access to the cloud infrastructure

B.

Utilization constraints on the bandwidth imposed by the cloud service vendor

C.

Limits for up-time of the hosted system

D.

Restrictions on the data storage options offered by the cloud service provider

Which phase of the cloud data life cycle involves the process of crypto-shredding?

A.

Destroy

B.

Create

C.

Archive

D.

Store

Which countermeasure should be taken during the containment, eradication, and recovery phase of the incident response lifecycle?

A.

Validate alerts

B.

Identify training

C.

Build timeline of attack

D.

Take systems offline

An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?

A.

Verifying the details of the contract and arrangements for data transfer

B.

Ensuring the vendor has securely destroyed all confidential information

C.

Identifying the business need the vendor will address

D.

Deciding how to respond to the request for proposal (RFP)

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

A.

Performance efficiency

B.

Operational excellence

C.

Reliability

D.

Sustainability

Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?

A.

Risk transfer

B.

Vulnerability assessment

C.

Business impact analysis

D.

Out-of-band validation

Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?

A.

Internet of Things

B.

Cloud computing

C.

Big data

D.

Machine learning

Which cloud model allows an on-premises data center to use cloud bursting?

A.

Public

B.

Hybrid

C.

Community

D.

Private

What is a benefit of federated identity and access management (IAM)?

A.

Use of U.S. federal government identities

B.

Segregation of duties

C.

Disablement of CSP

D.

Use of an organization’s identities

Page: 2 / 4
Total 204 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved