信頼的なManaging-Cloud-Security無料試験一回合格-最新のManaging-Cloud-Security技術試験私たちWGUが提供するManaging-Cloud-Securityクイズトレントは、理論と実践の最新の開発に基づいた深い経験を持つ専門家によってコンパイルされているため、非常に価値があります。 製品を購入する前に、まず製品を試してください。 MogiExamのManaging-Cloud-Security試験の合格に役立つだけでなく、時間とエネルギーを節約できるため、Managing-Cloud-Security試験準備を購入する価値があります。 お客様の満足が私たちのサービスの目的です。Managing-Cloud-Securityクイズトレントを簡単にWGU Managing Cloud Security (JY02)購入してください。 WGU Managing Cloud Security (JY02) 認定 Managing-Cloud-Security 試験問題 (Q81-Q86):質問 # 81
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
A. Capacity management
B. Baselining
C. Deployment
D. Patch management
正解:B
解説:
Baselining is the process of establishing a reference point for the standard configuration of systems, networks, or applications. This baseline represents the approved, secure state. By continuously comparing the current environment to the baseline, organizations can detect deviations, unauthorized changes, or misconfigurations.
Patch management involves updating systems, deployment refers to installing new systems, and capacity management focuses on resource planning. While important, these do not establish a standard state for comparison.
Baselining is essential for change management and security auditing. It supports configuration management databases (CMDBs), intrusion detection, and compliance requirements. When deviations are detected, they can be escalated for remediation or formally approved through change control processes.
質問 # 82
When should a cloud service provider delete customer data?
A. When the data has not been accessed in the last 30 days
B. After a scheduled data review
C. After the specified retention period
D. When the cloud provider oversubscribes its storage space
正解:C
解説:
The correct time for data deletion isafter the specified retention perioddefined by contractual agreements, regulatory frameworks, or internal policies. Retention policies ensure that data is kept for as long as necessary for business, legal, or compliance reasons but not longer than required.
Oversubscription, inactivity, or review cycles are not valid triggers because they may conflict with compliance mandates such as GDPR, HIPAA, or PCI DSS. Deleting data prematurely could result in legal penalties or business risks, while keeping it longer than necessary could increase exposure.
By deleting data only after the retention period, providers demonstrate adherence to data governance principles and protect customer rights while minimizing storage costs and liability.
質問 # 83
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
A. Trusted platform module (TPM)
B. RAID controller
C. Hardware security module (HSM)
D. Memory controller
正解:C
解説:
AHardware Security Module (HSM)is a dedicated, tamper-resistant device designed for creating, managing, and storing encryption keys. In cloud environments, HSMs are essential for securing cryptographic operations, such as SSL/TLS key management, digital signatures, and secure data transmission.
TPMs are hardware chips used to secure local devices, such as laptops. Memory controllers and RAID controllers manage system performance and storage but are not cryptographic devices.
HSMs provide strong protection against key theft or misuse by isolating cryptographic functions from general- purpose computing resources. They are often certified under standards like FIPS 140-2, ensuring compliance with stringent security requirements. In cloud services, customers can use provider-managed HSMs or deploy dedicated virtual HSM instances for secure key management.
質問 # 84
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
A. Maintenance mode
B. Ephemeral computing
C. High availability
D. Resource scheduling
正解:B
解説:
The capability to rapidly create and destroy virtual systems as demand fluctuates is known asephemeral computing. These short-lived resources are provisioned automatically when needed and decommissioned when demand subsides.
Resource scheduling helps allocate resources but does not imply temporary lifespans. High availability ensures continuous service, and maintenance mode is used for administrative tasks.
Ephemeral computing is central to elasticity in cloud environments, reducing costs and improving scalability.
For example, containers or serverless functions may run only while needed and then disappear. This model optimizes utilization, lowers expenses, and supports modern application architectures that demand agility.
質問 # 85
What is the process of identifying and procuring stored data as evidence for legal purposes?
A. Electronic discovery
B. Gap analysis
C. Forensic imaging
D. Chain of custody
正解:A
解説:
The correct answer iselectronic discovery (e-discovery). This process involves identifying, collecting, and producing electronically stored information (ESI) that may serve as evidence in legal proceedings. E- discovery ensures that relevant data such as emails, logs, or documents is preserved and made available in a legally defensible manner.
Chain of custody refers to documenting the handling of evidence once collected, while forensic imaging creates exact copies of digital media. Gap analysis identifies weaknesses in processes but is unrelated to evidence collection.
E-discovery is essential in both corporate and cloud contexts, as data is often distributed across multiple environments. Cloud providers may assist customers with e-discovery by providing tools for searching, tagging, and exporting relevant data. A sound e-discovery process ensures compliance with legal obligations and prevents spoliation of evidence.