11.11 Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 24 questions
Exam Code: Managing-Cloud-Security                Update: Nov 16, 2025
Exam Name: WGU Managing Cloud Security (JY02)

WGU WGU Managing Cloud Security (JY02) Managing-Cloud-Security Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Question # 2

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Question # 3

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Question # 4

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Question # 5

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Question # 6

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols

Question # 7

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Question # 8

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

A.

Performance efficiency

B.

Operational excellence

C.

Reliability

D.

Sustainability

Question # 9

Which term describes data elements that, when combined with other information, are used to single out an individual?

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Question # 10

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Page: 1 / 3
Total 24 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Nov 2025