EC-Council 312-40 Certified Cloud Security Engineer (CCSE) Online Training
EC-Council 312-40 Online Training
The questions for 312-40 were last updated at Nov 23,2024.
- Exam Code: 312-40
- Exam Name: Certified Cloud Security Engineer (CCSE)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool’s high availability settings must be checked for this?
- A . MySQL Database
- B . Always on Availability Groups (AGs)
- C . SQL Server Database Mirroring (DBM)
- D . Google Cloud SQL
An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool’s high availability settings must be checked for this?
- A . MySQL Database
- B . Always on Availability Groups (AGs)
- C . SQL Server Database Mirroring (DBM)
- D . Google Cloud SQL
An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool’s high availability settings must be checked for this?
- A . MySQL Database
- B . Always on Availability Groups (AGs)
- C . SQL Server Database Mirroring (DBM)
- D . Google Cloud SQL
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?
- A . It locks down the inbound traffic from myprodvm by creating a rule in the network security group
- B . It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
- C . It locks down the outbound traffic from myprodvm by creating a rule in the network security group
- D . It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall
William O’Neil works as a cloud security engineer in an IT company located in Tampa, Florida. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access.
Which of the following commands should William try to create a new user access key ID and secret key for a user?
- A . aws iam target_user -user-name create-access-key
- B . aws iam create-access-key -user-name target_user
- C . aws iam create-access-key target_user -user-name
- D . aws iam -user-name target_user create-access-key
Colin Farrell works as a senior cloud security engineer in a healthcare company. His organization has migrated all workloads and data in a private cloud environment. An attacker used the cloud environment as a point to disrupt the business of Colin’s organization. Using intrusion detection prevention systems, antivirus software, and log analyzers, Colin successfully detected the incident; however, a group of users were not able to avail the critical services provided by his organization.
Based on the incident impact level classification scales, select the severity of the incident encountered by Colin’s organization?
- A . High
- B . None
- C . Low
- D . Medium