Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 204 questions

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

What is at risk in the cloud environment when the management console is breached?

A.

Breakout of a guest OS that can access other hypervisors

B.

Amount of content on the image store

C.

Entire infrastructure that the control plane administers

D.

Sensitive information that images and snapshots can contain

A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?

A.

Data is sent to the tokenization server.

B.

The application generates a piece of sensitive data.

C.

The tokenization server returns the token to the application.

D.

The application stores the token rather than the original data.

Which risk is unable to be highlighted from the outset in a cloud services contract?

A.

Introduction of new technology

B.

Sunsetting of aging technology

C.

Result of an unforeseen event

D.

Changes resulting from contract renewals

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Which process is implemented during the hardening of an operating system (OS) and its workloads?

A.

Change management

B.

Incident management

C.

Patch management

D.

Security management

Which cloud computing role can subscribe to a software as a service (SaaS) application?

A.

Cloud service customer

B.

Cloud computing

C.

Cloud service provider

D.

Cloud application

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Which regulation provides a guide for implementing the risk management framework?

A.

NIST SP 800-37

B.

ISO 31000:2009

C.

ISO 27001

D.

PCI-DSS

Which phase in secure application design and development includes threat modeling?

A.

Define

B.

Design

C.

Training

D.

Develop

Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?

A.

Object-based

B.

Volume

C.

Relational database

D.

File

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Which security control is a countermeasure against vendor lock-in and lock-out?

A.

Offsite backups

B.

Video surveillance

C.

Disk redundancy

D.

Training programs

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

A.

HIPAA

B.

GDPR

C.

COPPA

D.

APPI

Which cloud model provides retention of governance controls to a large company with legacy systems?

A.

Private

B.

Public

C.

Community

D.

Hybrid

Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?

A.

Physical location of the web application firewall (WAF)

B.

Jurisdictional location of data

C.

Physical location of load balancer

D.

Jurisdictional location of availability zone

Which requirement in the Gramm-Leach-Bliley Act (GLBA) is included to protect private data?

A.

Independent auditor

B.

Gap analysis

C.

Information security plan

D.

Limited scope definition

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Page: 3 / 4
Total 204 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved