You are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud
provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to comply with the existing legislative and
contractual frameworks your organization is required to follow. This is a issue.
a. Resiliency
b. Privacy
c. Performance
d.Regulat
oryD
You are the security subject matter expert (SME) for an organization considering a transition from the legacy environ ment into a hosted cloud
provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to allow your organization to substantiate
and determine with some assurance that all of the contract terms are being met. This is a(n)
issue.
a. Regulatory
b. Privacy
c. Resiliency
d. Auditab
ilityD
Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and
transaction that takes place on the cloud, why might that not be the optimum choice for an organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.
c. It might result in vendor lockout.
d.The data subjects might be
upset by this.B
Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and
transaction that takes place on the cloud, whymight that not be the optimum choice for an organization?
a. It could increase the possibility of physical theft.
b. Encryption won 't work throughout the environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within
the organization.C
Which of the following is not an element of the identification component of identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisio
ningC
Which of the following entities is most likely to play a vital role in the identity provisioning aspect of a user 's experience in an organization?
a. The accounting department
b.The human resources (HR) office
c. The maintenance team
d.The purchasing
officeB
Why is the deprovisioning element of the identification component of identity and access management (IAM) so important?
a. Extra accounts cost so much extra money.
b.Open but unassigned accounts are vulnerabilities.
c. User tracking is essential to performance.
d. Encryption has to be
maintained.B
All of the following are reasons to perform review and maintenance actions on user accounts except .
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |