Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-40 EC-Council Certified Cloud Security Engineer (CCSE) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-40 Practice Questions

EC-Council Certified Cloud Security Engineer (CCSE)

Last Update 1 day ago
Total Questions : 147

Dive into our fully updated and stable 312-40 practice test platform, featuring all the latest Certified Cloud Security Engineer (CCSE) exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Cloud Security Engineer (CCSE) practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-40. Use this test to pinpoint which areas you need to focus your study on.

312-40 PDF

312-40 PDF (Printable)
$43.75
$124.99

312-40 Testing Engine

312-40 PDF (Printable)
$50.75
$144.99

312-40 PDF + Testing Engine

312-40 PDF (Printable)
$63.7
$181.99
Question # 51

Maria Howell has been working as a senior cloud security engineer in an loT manufacturing company. Her organization designs, develops, and tests loT devices. It uses Microsoft Azure cloud-based services. Maria had no knowledge of data science and the various ML and Al models used for data analysis, but she would like to analyze the time-series data generated from loT devices to monitor and identify abnormalities. Which of the following is an Al-based Azure service that can help Maria in monitoring and identifying the abnormalities in time series data without requiring any knowledge of machine learning?

Options:

A.  

Application Insights

B.  

Azure Sentinel

C.  

Cloud App Security

D.  

Anomaly Detector

Discussion 0
Question # 52

IntSecureSoft Solutions Pvt. Ltd. is an IT company that develops software and applications for various educational institutions. The organization has been using Google cloud services for the past 10 years. Tara Reid works as a cloud security engineer in IntSecureSoft Solutions Pvt. Ltd. She would like to identify various misconfigurations and vulnerabilities such as open storage buckets, instances that have not implemented SSL, and resources without an enabled Web UI. Which of the following is a native scanner in the Security Command Center that assesses the overall security state and activity of virtual machines, containers, network, and storage along with the identity and access management policies?

Options:

A.  

Log Analytics Workspace

B.  

Google Front End

C.  

Security Health Analytics

D.  

Synapse Analytics

Discussion 0
Question # 53

An AWS customer was targeted with a series of HTTPS DDoS attacks, believed to be the largest layer 7 DDoS reported to date. Starting around 10 AM ET on March 1, 2023, more than 15,500 requests per second (rps) began targeting the AWS customer's load balancer. After 10 min, the number of requests increased to 2,50,000 rps.

This attack resembled receiving the entire daily traffic in only 10s. An AWS service was used to sense and mitigate this DDoS attack as well as prevent bad bots and application vulnerabilities. Identify which of the following AWS services can accomplish this.

Options:

A.  

AWS Amazon Direct Connect

B.  

Amazon CloudFront

C.  

AWS Shield Standard

D.  

AWS EBS

Discussion 0
Question # 54

SecAppSol Pvt. Ltd. is a cloud software and application development company located in Louisville, Kentucky. The security features provided by its previous cloud service provider was not satisfactory, and in 2012, the organization became a victim of eavesdropping. Therefore, SecAppSol Pvt. Ltd. changed its cloud service provider and adopted AWS cloud-based services owing to its robust and cost-effective security features. How does SecAppSol Pvt. Ltd.'s security team encrypt the traffic between the load balancer and client that initiate

SSL or TLS sessions?

Options:

A.  

By enabling Amazon GuardDuty

B.  

By enabling HTTPS listener

C.  

By enabling Cloud Identity Aware Proxy

D.  

By enabling RADIUS Authentication

Discussion 0
Question # 55

Thomas Gibson is a cloud security engineer who works in a multinational company. His organization wants to host critical elements of its applications; thus, if disaster strikes, applications can be restored quickly and completely. Moreover, his organization wants to achieve lower RTO and RPO values. Which of the following disaster recovery approach should be adopted by Thomas' organization?

Options:

A.  

Warm Standby

B.  

Pilot Light approach

C.  

Backup and Restore

D.  

Multi-Cloud Option

Discussion 0
Question # 56

A web server passes the reservation information to an application server and then the application server queries an Airline service. Which of the following AWS service allows secure hosted queue server-side encryption (SSE), or uses custom SSE keys managed in AWS Key Management Service (AWS KMS)?

Options:

A.  

Amazon Simple Workflow

B.  

Amazon SQS

C.  

Amazon SNS

D.  

Amazon CloudSearch

Discussion 0
Question # 57

A multinational company decided to shift its organizational infrastructure and data to the cloud. Their team finalized the service provider. Which of the following is a contract that can define the security standards agreed upon by the service provider to maintain the security of the organizational data and infrastructure and define organizational data compliance?

Options:

A.  

Service Agreement

B.  

Service Level Agreement

C.  

Service Level Contract

D.  

Compliance Agreement

Discussion 0
Question # 58

Luke Grimes has recently joined a multinational company as a cloud security engineer. The company has been using the AWS cloud. He would like to reduce the risk of man-in-the-middle attacks in all Redshift clusters.

Which of the following parameters should Grimes enable to reduce the risk of man-in-the-middle attacks in all Redshift clusters?

Options:

A.  

wlm_ssl

B.  

enable_user_ssl

C.  

require_ssl

D.  

fips_ssl

Discussion 0
Question # 59

Frances Fisher has been working as a cloud security engineer in a multinational company. Her organization uses Microsoft Azure cloud-based services. Frances created a resource group (devResourceGroup); then, she created a virtual machine (devVM) in that resource group. Next. Frances created a Bastion host for the virtual machine (devVM) and she connected the virtual machine using Bastion from the Azure portal. Which of the following protocols Is used by Azure Bastion to provide secure connectivity to Frances' virtual machine (devVM) from the Azure portal?

Options:

A.  

TLS

B.  

HTTP

C.  

Telnet

D.  

TCP

Discussion 0
Question # 60

Jordon Bridges has been working as a senior cloud security engineer in a multinational company. His organization uses Google cloud-based services. Jordon stored his organizational data in the bucket and named the bucket in the Google cloud storage following the guidelines for bucket naming. Which of the following is a valid bucket name given by Jordon?

Options:

A.  

company-storage-data

B.  

Company-storage-data

C.  

Company-Storage-Data

D.  

company storage data

Discussion 0
Get 312-40 dumps and pass your exam in 24 hours!

Free Exams Sample Questions