EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Feb 19,2025.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Feb 19,2025
Ray Nicholson works as a senior cloud security engineer in TerraCloud Sec Pvt. Ltd. His organization deployed all applications in a cloud environment in various virtual machines. Using IDS, Ray identified that an attacker compromised a particular VM. He would like to limit the scope of the incident and protect other resources in the cloud.
If Ray turns off the VM, what will happen?
- A . The data required to be investigated will be lost
- B . The data required to be investigated will be recovered
- C . The data required to be investigated will be stored in the VHD
- D . The data required to be investigated will be saved
An IT company uses two resource groups, named Production-group and Security-group, under the same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk of the suspect virtual machine Ubuntu18 for further investigation and copy the snapshot to a storage account under Security-group.
Identify the next step in the investigation of the security incident in Azure?
- A . Copy the snapshot to file share
- B . Generate shared access signature
- C . Create a backup copy of snapshot in a blob container
- D . Mount the snapshot onto the forensic workstation
The GCP environment of a company named Magnitude IT Solutions encountered a security incident. To respond to the incident, the Google Data Incident Response Team was divided based on the different aspects of the incident.
Which member of the team has an authoritative knowledge of incidents and can be involved in different domains such as security, legal, product, and digital forensics?
- A . Operations Lead
- B . Subject Matter Experts
- C . Incident Commander
- D . Communications Lead
Jayson Smith works as a cloud security engineer in CloudWorld SecCo Pvt. Ltd. This is a third-party vendor that provides connectivity and transport services between cloud service providers and cloud consumers. Select the actor that describes CloudWorld SecCo Pvt. Ltd. based on the NIST cloud deployment reference architecture?
- A . Cloud Broker
- B . Cloud Auditor
- C . Cloud Carrier
- D . Cloud Provider
Brentech Services allows its clients to access (read, write, or delete) Google Cloud Storage resources for a limited time without a Google account while it controls access to Cloud Storage.
How does the organization accomplish this?
- A . Using BigQuery column-level security
- B . Using Signed Documents
- C . Using Signed URLs
- D . Using BigQuery row-level-security
Daffod is an American cloud service provider that provides cloud-based services to customers worldwide.
Several customers are adopting the cloud services provided by Daffod because they are secure and cost-effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the economic and national security interests of the US.
Based on the given information, which law order does Daffod adhere to?
- A . FERPA
- B . CLOUD
- C . FISMA
- D . ECPA
Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI.
Which of the following command should Simon run in the EC2 instance to disable user account passwords?
- A . passwd -D < USERNAME >
- B . passwd -I < USERNAME >
- C . passwd -d < USERNAME >
- D . passwd -L < USERNAME >
An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool’s high availability settings must be checked for this?
- A . MySQL Database
- B . Always on Availability Groups (AGs)
- C . SQL Server Database Mirroring (DBM)
- D . Google Cloud SQL
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
William O’Neil works as a cloud security engineer in an IT company located in Tampa, Florida. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access.
Which of the following commands should William try to create a new user access key ID and secret key for a user?
- A . aws iam target_user -user-name create-access-key
- B . aws iam create-access-key -user-name target_user
- C . aws iam create-access-key target_user -user-name
- D . aws iam -user-name target_user create-access-key