Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Managing-Cloud-Security WGU Managing Cloud Security (JY02) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 80 questions

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Which phase of the cloud data life cycle involves the process of crypto-shredding?

A.

Destroy

B.

Create

C.

Archive

D.

Store

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Which concept focuses on operating highly available workloads in the cloud?

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

A.

Testing

B.

Training

C.

Planning

D.

Coding

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Which activity is within the scope of the cloud provider’s role in the chain of custody?

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Which security concept requires continuous identity and authorization checks to allow access to data?

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

A.

One-way hashing

B.

Degaussing

C.

Overwriting

D.

Cryptographic erasure

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

When should a cloud service provider delete customer data?

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Page: 1 / 2
Total 80 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved