EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Nov 24,2024.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Nov 24,2024
An organization wants to detect its hidden cloud infrastructure by auditing its cloud environment and resources such that it shuts down unused/unwanted workloads, saves money, minimizes security risks, and optimizes its cloud inventory.
In this scenario, which standard is applicable for cloud security auditing that enables the management of customer data?
- A . Cloud Security Alliance
- B . ISO 27001 & 27002
- C . SOC2
- D . NIST SP800-53 rev 4
An organization wants to detect its hidden cloud infrastructure by auditing its cloud environment and resources such that it shuts down unused/unwanted workloads, saves money, minimizes security risks, and optimizes its cloud inventory.
In this scenario, which standard is applicable for cloud security auditing that enables the management of customer data?
- A . Cloud Security Alliance
- B . ISO 27001 & 27002
- C . SOC2
- D . NIST SP800-53 rev 4
An organization wants to detect its hidden cloud infrastructure by auditing its cloud environment and resources such that it shuts down unused/unwanted workloads, saves money, minimizes security risks, and optimizes its cloud inventory.
In this scenario, which standard is applicable for cloud security auditing that enables the management of customer data?
- A . Cloud Security Alliance
- B . ISO 27001 & 27002
- C . SOC2
- D . NIST SP800-53 rev 4
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Rufus Sewell, a cloud security engineer with 5 years of experience, recently joined an MNC as a senior cloud security engineer. Owing to the cost-effective security features and storage services provided by AWS, his organization has been using AWS cloud-based services since 2014. To create a RAID, Rufus created an Amazon EBS volume for the array and attached the EBS volume to the instance where he wants to host the array. Using the command line, Rufus successfully created a RAID. The array exhibits noteworthy performance both in read and write operations with no overhead by parity control and the entire storage capacity of the array is used.
The storage capacity of the RAID created by Rufus is equal to the sum of disk capacity in the set, but the array is not fault tolerant. It is ideal for non-critical cloud data storage that must be read/written at a high speed.
Based on the given information, which of the following RAID is created by Rufus?
- A . RAID 0
- B . RAID 5
- C . RAID 1
- D . RAID 6
Rufus Sewell, a cloud security engineer with 5 years of experience, recently joined an MNC as a senior cloud security engineer. Owing to the cost-effective security features and storage services provided by AWS, his organization has been using AWS cloud-based services since 2014. To create a RAID, Rufus created an Amazon EBS volume for the array and attached the EBS volume to the instance where he wants to host the array. Using the command line, Rufus successfully created a RAID. The array exhibits noteworthy performance both in read and write operations with no overhead by parity control and the entire storage capacity of the array is used.
The storage capacity of the RAID created by Rufus is equal to the sum of disk capacity in the set, but the array is not fault tolerant. It is ideal for non-critical cloud data storage that must be read/written at a high speed.
Based on the given information, which of the following RAID is created by Rufus?
- A . RAID 0
- B . RAID 5
- C . RAID 1
- D . RAID 6