EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Nov 23,2024.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
You are the manager of a cloud-based security platform that offers critical services to government agencies and private companies. One morning, your team receives an alert from the platform’s intrusion detection system indicating that there has been a potential breach in the system.
As the manager, which tool you will use for viewing and monitoring the sensitive data by scanning storage systems and reviewing the access rights to critical resources via a single centralized dashboard?
- A . Google Cloud Security Command Center
- B . Google Cloud Security Scanner
- C . Cloud Identity and Access Management (IAM)
- D . Google Cloud Armor
You are the manager of a cloud-based security platform that offers critical services to government agencies and private companies. One morning, your team receives an alert from the platform’s intrusion detection system indicating that there has been a potential breach in the system.
As the manager, which tool you will use for viewing and monitoring the sensitive data by scanning storage systems and reviewing the access rights to critical resources via a single centralized dashboard?
- A . Google Cloud Security Command Center
- B . Google Cloud Security Scanner
- C . Cloud Identity and Access Management (IAM)
- D . Google Cloud Armor
You are the manager of a cloud-based security platform that offers critical services to government agencies and private companies. One morning, your team receives an alert from the platform’s intrusion detection system indicating that there has been a potential breach in the system.
As the manager, which tool you will use for viewing and monitoring the sensitive data by scanning storage systems and reviewing the access rights to critical resources via a single centralized dashboard?
- A . Google Cloud Security Command Center
- B . Google Cloud Security Scanner
- C . Cloud Identity and Access Management (IAM)
- D . Google Cloud Armor
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.
Subsequently, the incident response team made the website and database server offline.
In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?
- A . Analysis
- B . Containment
- C . Coordination and information sharing
- D . Post-mortem
Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization’s virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
- A . IBM
- B . AWS
- C . Azure
- D . Google