WGU Course C838 - Managing Cloud Security C838 OA
QUESTIONS AND ANSWERS LATEST 2023-2024
|AGRADE
Which phase of the cloud data life cycle allows both
... [Show More] read and process functions to be
performed?
A Create
B Archive
C Store
D Share - Answer A
Which phase of the cloud data security life cycle typically occurs simultaneously with
creation?
A Share
B Store
C Use
D Destroy - Answer B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - Answer C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store - Answer C
Which cloud data storage architecture allows sensitive data to be replaced with unique
identification symbols that retain all the essential information about the data without
compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization - Answer D
Which methodology could cloud data storage utilize to encrypt all data associated in an
infrastructure as a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption - Answer D
There is a threat to a banking cloud platform service. The developer needs to provide
inclusion in a relational database that is seamless and readily searchable by search
engine algorithms.
Which platform as a service (PaaS) data type should be used?
A Short-term storage
B Structured
C Unstructured
D Long-term storage - Answer B
Which platform as a service (PaaS) storage architecture should be used if an
organization wants to store presentations, documents, and audio files?
A Relational database
B Block
C Distributed
D Object - Answer D
Which technique scrambles the content of data using a mathematical algorithm while
keeping the structural arrangement of the data?
A Dynamic masking
B Format-preserving encryption
C Proxy-based encryption
D Tokenization - Answer B
Which encryption technique connects the instance to the encryption instance that
handles all crypto operations?
A Database
B Proxy
C Externally managed
D Server-side - Answer [Show Less]