EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Apr 24,2025.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Apr 24,2025
Tom Holland works as a cloud security engineer in an IT company located in Lansing, Michigan. His organization has adopted cloud-based services wherein user access, application, and data security are the responsibilities of the organization, and the OS, hypervisor, physical, infrastructure, and network security are the responsibilities of the cloud service provider.
Based on the aforementioned cloud security shared responsibilities, which of the following cloud computing service models is enforced in Tom’s organization?
- A . Infrastructure-as-a-Service
- B . Platform-as-a-Service
- C . On-Premises
- D . Software-as-a-Service
Elaine Grey has been working as a senior cloud security engineer in an IT company that develops software and applications related to the financial sector. Her organization would like to extend its storage capacity and automate disaster recovery workflows using a VMware private cloud.
Which of the following storage options can be used by Elaine in the VMware virtualization environment to connect a VM directly to a LUN and access it from SAN?
- A . File Storage
- B . Object Storage
- C . Raw Storage
- D . Ephemeral Storage
Securelnfo Pvt. Ltd. has deployed all applications and data in the AWS cloud. The security team of this organization would like to examine the health of the organization’s website regularly and switch (or failover) to a backup site if the primary website becomes unresponsive.
Which of the following AWS services can provide DNS failover capabilities and health checks to ensure the availability of the organization’s website?
- A . Amazon CloudFront Security
- B . Amazon CloudTrail Security
- C . Amazon Route 53 Security
- D . Amazon CloudWatch Security
Coral IT Systems is a multinational company that consumes cloud services. As a cloud service consumer (CSC), the organization should perform activities such as selecting, monitoring, implementing, reporting, and securing the cloud services. The CSC and cloud service provider (CSP) have a business relationship in which the CSP delivers cloud services to the CSC.
Which cloud governance role is applicable to the organization?
- A . Cloud auditor
- B . Cloud service manager
- C . Cloud service administrator
- D . Cloud service deployment manager
Terry Diab has an experience of 6 years as a cloud security engineer. She recently joined a multinational company as a senior cloud security engineer. Terry learned that there is a high probability that her organizational applications could be hacked and user data such as passwords, usernames, and account information can be exploited by an attacker. The organizational applications have not yet been hacked, but this issue requires urgent action. Therefore, Terry, along with her team, released a software update that is designed to resolve this problem instantly with a quick-release procedure. Terry successfully fixed the problem (bug) in the software product immediately without following the normal quality assurance procedures. Terry’s team resolved the problem immediately on the live system with zero downtime for users. Based on the given information, which of the following type of update was implemented by Terry?
- A . Patch
- B . Rollback
- C . Hotfix
- D . Version update
An organization wants to detect its hidden cloud infrastructure by auditing its cloud environment and resources such that it shuts down unused/unwanted workloads, saves money, minimizes security risks, and optimizes its cloud inventory. In this scenario, which standard is applicable for cloud security auditing that enables the management of customer data?
- A . Cloud Security Alliance
- B . ISO 27001 & 27002
- C . SOC2
- D . NIST SP800-53 rev 4
Shell Solutions Pvt. Ltd. is an IT company that develops software products and services for BPO companies. The organization became a victim of a cybersecurity attack. Therefore, it migrated its applications and workloads from on-premises to a cloud environment. Immediately, the organization established an incident response team to prevent such incidents in the future. Using intrusion detection system and antimalware software, the incident response team detected a security incident and mitigated the attack. The team recovered the resources from the incident and identified various vulnerabilities and flaws in their cloud environment.
Which step of the incident response lifecycle includes the lessons learned from previous attacks and analyzes and documents the incident to understand what should be improved?
- A . Analysis
- B . Post-mortem
- C . Coordination and Information Sharing
- D . Preparation
Rufus Sewell, a cloud security engineer with 5 years of experience, recently joined an MNC as a senior cloud security engineer. Owing to the cost-effective security features and storage services provided by AWS, his organization has been using AWS cloud-based services since 2014. To create a RAID, Rufus created an Amazon EBS volume for the array and attached the EBS volume to the instance where he wants to host the array. Using the command line, Rufus successfully created a RAID. The array exhibits noteworthy performance both in read and write operations with no overhead by parity control and the entire storage capacity of the array is used.
The storage capacity of the RAID created by Rufus is equal to the sum of disk capacity in the set, but the array is not fault tolerant. It is ideal for non-critical cloud data storage that must be read/written at a high speed.
Based on the given information, which of the following RAID is created by Rufus?
- A . RAID 0
- B . RAID 5
- C . RAID 1
- D . RAID 6
Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disaster recovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss.
Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel’s organization?
- A . Warm Site
- B . Cold Site
- C . Remote site
- D . Hot Site
Scott Herman works as a cloud security engineer in an IT company located in Ann Arbor, Michigan. His organization uses Office 365 Business Premium that provides Microsoft Teams, secure cloud storage, business email, premium Office applications across devices, advanced cyber threat protection, and device management.
Which of the following cloud computing service models does Microsoft Office 365 represent?
- A . DaaS
- B . laaS
- C . PaaS
- D . SaaS