Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil Certified Cloud Security Engineer (CCSE) 312-40 Questions and answers with ValidTests

Exam 312-40 All Questions
Exam 312-40 Premium Access

View all detail and faqs for the 312-40 exam

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

TechGloWorld is an IT company that develops cybersecurity software and applications for various customers across the globe. Owing to the cost-effective security and storage services provided by AWS. TechGloWorld has adopted AWS cloud-based services. A new employee, named Tom Harrison, has joined TechGloWorld as a cloud security engineer. The team leader of cloud security engineers would like to add an 1AM user named Tom to the 1AM group named Admins. Which of the following commands should be used by the TechGloWorld security team leader?

Options:

A.

aws iam --group-name Admins -user-name Tom add-user-to-group

B.

aws iam —group-name Admins —user-name Tarn-add-user-to-group

C.

aws iam add-user-to-group —user-name Tom —group-name Admins

D.

aws iam add-user-to-group —user-name Torn —group-name Admin

Expert Solution
Questions # 42:

SevocSoft Private Ltd. is an IT company that develops software and applications for the banking sector. The security team of the organization found a security incident caused by misconfiguration in Infrastructure-as-Code (laC) templates. Upon further investigation, the security team found that the server configuration was

built using a misconfigured laC template, which resulted in security breach and exploitation of the

organizational cloud resources. Which of the following would have prevented this security breach and exploitation?

Options:

A.

Testing of laC Template

B.

Scanning of laC Template

C.

Striping of laC Template

D.

Mapping of laC Template

Expert Solution
Questions # 43:

An AWS customer was targeted with a series of HTTPS DDoS attacks, believed to be the largest layer 7 DDoS reported to date. Starting around 10 AM ET on March 1, 2023, more than 15,500 requests per second (rps) began targeting the AWS customer's load balancer. After 10 min, the number of requests increased to 2,50,000 rps.

This attack resembled receiving the entire daily traffic in only 10s. An AWS service was used to sense and mitigate this DDoS attack as well as prevent bad bots and application vulnerabilities. Identify which of the following AWS services can accomplish this.

Options:

A.

AWS Amazon Direct Connect

B.

Amazon CloudFront

C.

AWS Shield Standard

D.

AWS EBS

Expert Solution
Questions # 44:

James Harden works as a cloud security engineer in an IT company. James' organization has adopted a RaaS architectural model in which the production application is placed in the cloud and the recovery or backup target is kept in the private data center. Based on the given information, which RaaS architectural model is implemented in James' organization?

Options:

A.

From-cloud RaaS

B.

By-cloud RaaS

C.

To-cloud RaaS

D.

In-cloud RaaS

Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions