WGU Managing-Cloud-Securityソフトウエア、Managing-Cloud-Security復習対策GoShikenはウェブサイトだけでなく、候補者のための専門的な学習ツールとしても使用できます。 最後になりますが、Managing-Cloud-Securityトレーニング資料の高度な運用システムを使用して、WGUお客様に最速の配信速度を保証するだけでなく、お客様の個人情報を自動的に保護することもできます。 さらに、販売後の専門スタッフが、すべてのお客様に24時間年中無休でManaging-Cloud-Security試験WGU Managing Cloud Security (JY02)問題に関するオンラインアフターサービスを提供します。 そして、Managing-Cloud-Security学習ガイドの合格率は99%〜100%です。 Managing-Cloud-Security練習準備で認定を取得します。 WGU Managing Cloud Security (JY02) 認定 Managing-Cloud-Security 試験問題 (Q122-Q127):質問 # 122
Which management process involves multiple key holders, each with access to a portion of the information?
A. Escrow
B. Revocation
C. Recovery
D. Distribution
正解:A
解説:
Key escrow is the management process that involves multiple key holders, where each party has access to a portion of the cryptographic information. Managing Cloud principles explain that key escrow is designed to ensure availability and recoverability of encrypted data while maintaining security controls.
In this model, encryption keys are stored securely with trusted third parties or divided among multiple custodians. No single individual has full access to the complete key, reducing the risk of misuse or compromise. Key escrow is often used to support compliance, lawful access requirements, and business continuity needs, ensuring that encrypted data can be recovered if the primary key holder is unavailable.
The other options do not fit this definition. Recovery refers to restoring keys or data, revocation disables compromised keys, and distribution focuses on delivering keys to authorized systems. Therefore, escrow is the correct answer.
質問 # 123
Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?
A. Reliability
B. Sustainability
C. Performance efficiency
D. Operational excellence
正解:D
解説:
TheOperational Excellencepillar emphasizes practices that allow organizations to develop, deploy, and operate workloads effectively. It includes monitoring operations, responding to incidents, and continuously improving processes. By embedding feedback loops, organizations enhance agility and ensure that technology supports business value.
Performance efficiency deals with using computing resources efficiently, reliability ensures system availability, and sustainability focuses on environmental responsibility. While important, these do not encompass the process-driven improvements at the heart of operational excellence.
Operational excellence ensures that organizations can adapt quickly to changes, implement automation, and drive consistent improvements across cloud workloads. It is a key principle in cloud frameworks like AWS Well-Architected, Microsoft CAF, and Google's Reliability Engineering practices.
質問 # 124
An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?
A. Automatic expiration
B. Dynamic policy control
C. Continuous auditing
D. Persistent protection
正解:C
解説:
Continuous auditingin the context of Information Rights Management (IRM) allows organizations to monitor access events in real time. It records who accessed a file, when, and how often. This enables organizations to enforce accountability and detect unusual access patterns, which are crucial for both security monitoring and compliance reporting.
Automatic expiration sets a time limit on file availability, while dynamic policy control adjusts permissions based on context (such as location or device). Persistent protection ensures files remain encrypted and controlled wherever they travel. While each feature is valuable, only continuous auditing provides the tracking and visibility into usage required by the scenario.
This approach aligns with governance requirements, providing an audit trail that supports incident response and compliance with data protection regulations. Continuous auditing strengthens both operational security and accountability.
質問 # 125
Which risk relates to the removal of a person's information within the public cloud by legal authorities?
A. Data masking
B. Vendor lock-in
C. Remote wiping
D. Data seizure
正解:D
解説:
Data seizure is the risk associated with legal authorities removing or accessing a person's information stored in a public cloud. Managing Cloud guidance explains that cloud data is subject to the laws and legal processes of the jurisdiction in which it resides.
In some cases, government agencies may compel cloud service providers to disclose or seize data as part of legal investigations. This can occur without the data owner's direct involvement and may affect confidentiality, privacy, and business operations. Public cloud environments increase this risk because infrastructure is shared and often spans multiple jurisdictions.
Remote wiping is a data destruction technique, vendor lock-in relates to dependency on providers, and data masking protects sensitive data. Therefore, data seizure is the correct risk.
質問 # 126
Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?
A. Out-of-band validation
B. Business impact analysis
C. Vulnerability assessment
D. Risk transfer
正解:B
解説:
Business Impact Analysis (BIA) is the process that involves identifying and valuing assets to determine their potential effect on cloud operations. Managing Cloud documentation explains that BIA assesses how disruptions to systems, applications, or data impact business functions.
The process evaluates asset criticality, financial loss, operational downtime, and reputational damage. This information helps prioritize recovery strategies, define recovery time objectives, and guide risk management decisions in cloud environments.
Risk transfer shifts risk to third parties, vulnerability assessment identifies weaknesses, and out-of-band validation verifies controls independently. Therefore, business impact analysis is the correct answer.