Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil Certified Cloud Security Engineer (CCSE) 312-40 Questions and answers with ValidTests

Exam 312-40 All Questions
Exam 312-40 Premium Access

View all detail and faqs for the 312-40 exam

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment. Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and

documents the incident to understand what should be improved?

Options:

A.

Analysis

B.

Post-mortem

C.

Coordination and Information Sharing

D.

Preparation

Expert Solution
Questions # 22:

Jordon Bridges has been working as a senior cloud security engineer in a multinational company. His organization uses Google cloud-based services. Jordon stored his organizational data in the bucket and named the bucket in the Google cloud storage following the guidelines for bucket naming. Which of the following is a valid bucket name given by Jordon?

Options:

A.

company-storage-data

B.

Company-storage-data

C.

Company-Storage-Data

D.

company storage data

Expert Solution
Questions # 23:

Daffod is an American cloud service provider that provides cloud-based services to customers worldwide. Several customers are adopting the cloud services provided by Daffod because they are secure and cost-effective. Daffod is compliant with the cloud computing law that protects the student information collected by educational institutions and their associated vendors. Based on the information given, which law does Daffod adhere to?

Options:

A.

ECPA

B.

FERPA

C.

CLOUD

D.

FISMA

Expert Solution
Questions # 24:

For securing data, an AWS customer created a key in the Alabama region to encrypt their data in the California region. Two users were added to the key along with an external AWS account. When the AWS customer attempted to encrypt an S3 object, they observed that the key is not listed. What is the reason behind this?

Options:

A.

It takes time for new keys to be listed

B.

Encryption key should be in the same region

C.

S3 cannot be integrated with KMS

D.

AWS does not support external AWS accounts

Expert Solution
Questions # 25:

A multinational company decided to shift its organizational infrastructure and data to the cloud. Their team finalized the service provider. Which of the following is a contract that can define the security standards agreed upon by the service provider to maintain the security of the organizational data and infrastructure and define organizational data compliance?

Options:

A.

Service Agreement

B.

Service Level Agreement

C.

Service Level Contract

D.

Compliance Agreement

Expert Solution
Questions # 26:

Michael Keaton has been working as a cloud security specialist in a multinational company. His organization uses Google Cloud. Keaton has launched an application in nl-standard-1 (1 vCPU, 3.75 GB memory) instance.

Over the past three weeks, the instance has had low memory utilization. Which of the following machine type

switching is recommended for Keaton?

Options:

A.

gl-small (1 vCPU, 1.7 GB memory)

B.

nl-standard-2 (2 vCPU, 7.5 GB memory)

C.

fl-micro (1 vCPU, 614 GB memory)

D.

n1-standard-1 (1 vCPU, 3.75 GB memory)

Expert Solution
Questions # 27:

An Azure subscription owner, Arial Solutions, gets notified by Microsoft (by default} when a high-severity alert (email notification) is triggered. The cloud security engineer would like to send these security alerts to a specific Individual or anyone with particular Azure roles for a subscription, and modify the severity levels for which alerts are sent. How con the cloud security engineer configure these alerts?

Options:

A.

By selling Azure Front Door

B.

By exporting ASC alerts using the Export Feature

C.

By using ASC Data Connector to stream alerts to Azure Sentinel

D.

By setting ASC security contact

Expert Solution
Questions # 28:

A private IT company named Altitude Solutions conducts its operations from the cloud. The company wants to balance the interests of corporate stakeholders (higher management, employees, investors, and suppliers) to achieve control on the cloud infrastructure and facilities (such as data centers) and management of applications at the portfolio level. Which of the following represents the adherence to the higher management directing and controlling activities at various levels of the organization in a cloud environment?

Options:

A.

Risk Management

B.

Governance

C.

Corporate Compliance

D.

Regulatory Compliance

Expert Solution
Questions # 29:

Billy Pratt works as a cloud security engineer in an MNC. In 2012, his organization transferred all applications and data into an AWS cloud environment. Billy would like to analyze, investigate, and identify the root cause of malicious activities in his organization's AWS cloud environment. Which of the following Amazon services automatically collects data from various AWS resources and utilizes machine learning, statistical analysis, and graph theory to provide a unified and interactive view of resources and users that would help Billy in determining the root cause of suspicious activities?

Options:

A.

Amazon inspector

B.

Amazon Detective

C.

Amazon Guard Duty

D.

Amazon Macie

Expert Solution
Questions # 30:

Christina Hendricks recently joined an MNC as a cloud security engineer. Owing to robust provisions for storing an enormous quantity of data, security features, and cost-effective services offered by AWS, her organization migrated its applications and data from an on-premises environment to the AWS cloud. Christina's organization generates structured, unstructured, and semi-structured data. Christina's team leader asked her to store block-level data in AWS storage services. Which of the following AWS storage services should be used by Christina to store block-level data?

Options:

A.

Amazon EBS

B.

Amazon Glacier

C.

Amazon EFS

D.

Amazon S3

Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions