Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 204 questions

Which countermeasure should be taken during the preparation phase of the incident response lifecycle?

A.

Take the system offline

B.

Perform risk assessments

C.

Estimate the scope of the incident

D.

Build a timeline of attack

An organization wants to conduct some of the disaster recovery plan testing with the least possible impact on production. Which method should be used?

A.

Unit testing

B.

Full test

C.

Dry run test

D.

Tabletop testing

What is the definition of transportable as it relates to cloud contract design requirements?

A.

Available to be accessed by mobile devices

B.

Able to be moved to another vendor

C.

Available in a proprietary format

D.

Able to be archived quickly

Which logical consideration should be addressed when planning the design of a data center?

A.

Multitenancy of networks

B.

Heating and cooling

C.

Ability for expansion

D.

Utility power availability

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?

A.

Insurance

B.

Avoidance

C.

Mitigation

D.

Acceptance

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues

Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?

A.

Tabletop

B.

Dry run

C.

Parallel

D.

Full

Which security device allows customers to redirect traffic?

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

When should a cloud service provider delete customer data?

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

Which platform component includes containers and storage?

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?

A.

Sandboxing

B.

Threat modeling

C.

Application virtualization

D.

Multitenancy

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

A.

One-way hashing

B.

Degaussing

C.

Overwriting

D.

Cryptographic erasure

How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?

A.

Using round-robin load balancing

B.

Rerouting traffic to the mitigation services

C.

Having multiple endpoints

D.

Scaling the receiving application

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Which management process involves multiple key holders, each with access to a portion of the information?

A.

Recovery

B.

Revocation

C.

Distribution

D.

Escrow

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Which risk is unique to the public cloud?

A.

Regulatory noncompliance

B.

Vendor lock-in

C.

Personnel threats

D.

Malware

What is a risk in using the community cloud over the private cloud?

A.

Lack of virtual instances

B.

Loss of policy control

C.

Loss of trained personnel

D.

Lack of physical resources

Page: 1 / 4
Total 204 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved