EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Apr 24,2025.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Apr 24,2025
An Azure organization wants to enforce its on-premises AD security and password policies to filter brute-force attacks. Instead of using legacy authentication, the users should sign in to on-premises and cloud-based applications using the same passwords in Azure AD.
Which Azure AD feature can enable users to access Azure resources?
- A . Azure Automation
- B . Azure AD Connect
- C . Azure AD Pass Through Authentication
- D . Azure Policy
A document has an organization’s classified information. The organization’s Azure cloud administrator has to send it to different recipients. If the email is not protected, this can be opened and read by any user. So the document should be protected and it will only be opened by authorized users.
In this scenario, which Azure service can enable the admin to share documents securely?
- A . Azure Information Protection
- B . Azure Key Vault
- C . Azure Resource Manager
- D . Azure Content Delivery Network
SecureSoftWorld Pvt. Ltd. is an IT company that develops software solutions catering to the needs of the healthcare industry. Most of its services are hosted in Google cloud. In the cloud environment, to secure the applications and services, the organization uses Google App Engine Firewall that controls the access to the App Engine with a set of rules that denies or allows requests from a specified range of IPs.
How many unique firewall rules can SecureSoftWorld Pvt. Ltd define using App Engine Firewall?
- A . Up to 10000
- B . Up to 1000
- C . Up to 10
- D . Up to 100
A new public web application is deployed on AWS that will run behind an Application Load Balancer (ALB). An AWS security expert needs to encrypt the newly deployed application at the edge with an SSL/TLS certificate issued by an external certificate authority. In addition, he needs to ensure the rotation of the certificate yearly before it expires.
Which of the following AWS services can be used to accomplish this?
- A . AWS Snowball
- B . AWS Certificate Manager
- C . AWS Cloud HSM
- D . Amazon Elastic Load Balancer
A BPO company would like to expand its business and provide 24 x 7 customer service. Therefore, the organization wants to migrate to a fully functional cloud environment that provides all features with minimum maintenance and administration.
Which cloud service model should it consider?
- A . laaS
- B . PaaS
- C . RaaS
- D . SaaS
Thomas Gibson is a cloud security engineer who works in a multinational company. His organization wants to host critical elements of its applications; thus, if disaster strikes, applications can be restored quickly and completely. Moreover, his organization wants to achieve lower RTO and RPO values.
Which of the following disaster recovery approach should be adopted by Thomas’ organization?
- A . Warm Standby
- B . Pilot Light approach
- C . Backup and Restore
- D . Multi-Cloud Option
VenturiaCloud is a cloud service provider that offers robust and cost-effective cloud-based services to cloud consumers. The organization became a victim of a cybersecurity attack. An attacker performed a DDoS attack over the cloud that caused failure in the entire cloud environment. VenturiaCloud conducted a forensics investigation.
Who among the following are the first line of defense against cloud security attacks with their primary role being responding against any type of security incident immediately?
- A . Law Advisors
- B . Incident Handlers
- C . Investigators
- D . IT Professionals
Sandra, who works for SecAppSol Technologies, is on a vacation. Her boss asked her to solve an urgent issue in an application. Sandra had to use applications present on her office laptop to solve this issue, and she successfully rectified it. Despite being in a different location, she could securely use the application.
What type of service did the organization use to ensure that Sandra could access her office laptop from a remote area?
- A . Amazon AppStream 2.0
- B . Amazon Elastic Transcoder Service
- C . Amazon SQS
- D . Amazon Simple Workflow
Alice, a cloud forensic investigator, has located, a relevant evidence during his investigation of a
security breach in an organization’s Azure environment. As an investigator, he needs to sync different types of logs generated by Azure resources with Azure services for better monitoring.
Which Azure logging and auditing feature can enable Alice to record information on the Azure subscription layer and obtain the evidence (information related to the operations performed on a specific resource, timestamp, status of the operation, and the user responsible for it)?
- A . Azure Resource Logs
- B . Azure Storage Analytics Logs
- C . Azure Activity Logs
- D . Azure Active Directory Reports
Rick Warren has been working as a cloud security engineer in an IT company for the past 4 years. Owing to the robust security features and various cost-effective services offered by AWS, in 2010, his organization migrated to the AWS cloud environment. While inspecting the intrusion detection system, Rick detected a security incident.
Which of the following AWS services collects logs from various data sources and stores them on a centralized location as logs files that can be used during forensic investigation in the event of a security incident?
- A . Amazon CloudWatch
- B . AWS CloudFormation
- C . Amazon CloudFront
- D . Amazon CloudTrail