EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Nov 23,2024.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization’s virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
- A . IBM
- B . AWS
- C . Azure
- D . Google
Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization’s virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
- A . IBM
- B . AWS
- C . Azure
- D . Google
Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization’s virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
- A . IBM
- B . AWS
- C . Azure
- D . Google
Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization’s virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
- A . IBM
- B . AWS
- C . Azure
- D . Google
TetraSoft Pvt. Ltd. is an IT company that provides software and application services to numerous customers across the globe. In 2015, the organization migrated its applications and data from on-premises to the AWS cloud environment. The cloud security team of TetraSoft Pvt. Ltd. suspected that the EC2 instance that launched the core application of the organization is compromised. Given below are randomly arranged steps involved in the forensic acquisition of an EC2 instance.
In this scenario, when should the investigators ensure that a forensic instance is in the terminated state?
- A . After creating evidence volume from the snapshot
- B . Before taking a snapshot of the EC2 instance
- C . Before attaching evidence volume to the forensic instance
- D . After attaching evidence volume to the forensic instance
Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first.
Which Azure service can help her in detecting the severity and creating alerts?
- A . Windows Defender
- B . Cloud Operations Suite
- C . Microsoft Defender for Cloud
- D . Cloud DLP
Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first.
Which Azure service can help her in detecting the severity and creating alerts?
- A . Windows Defender
- B . Cloud Operations Suite
- C . Microsoft Defender for Cloud
- D . Cloud DLP
Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first.
Which Azure service can help her in detecting the severity and creating alerts?
- A . Windows Defender
- B . Cloud Operations Suite
- C . Microsoft Defender for Cloud
- D . Cloud DLP
Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first.
Which Azure service can help her in detecting the severity and creating alerts?
- A . Windows Defender
- B . Cloud Operations Suite
- C . Microsoft Defender for Cloud
- D . Cloud DLP
Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first.
Which Azure service can help her in detecting the severity and creating alerts?
- A . Windows Defender
- B . Cloud Operations Suite
- C . Microsoft Defender for Cloud
- D . Cloud DLP