Question # 1 A new public web application is deployed on AWS that will run behind an Application Load Balancer (ALB). An AWS security expert needs to encrypt the newly deployed application at the edge with an SSL/TLS certificate issued by an external certificate authority. In addition, he needs to ensure the rotation of the certificate yearly before it expires. Which of the following AWS services can be used to accomplish this?
A. AWS Snowball
B. AWS Cloud HSM
C. Amazon Elastic Load Balancer
Click for Answer
B. AWS Cloud HSM
Question # 2 An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured. Which tool's high availability settings must be checked for this?
A. MySQL Database
B. Always on Availability Groups (AGs)
C. SQL Server Database Mirroring (DBM)
D. Google Cloud SQL
Click for Answer
D. Google Cloud SQL
Question # 3 Tom Holland works as a cloud security engineer in an IT company located in Lansing, Michigan. His organization has adopted cloud-based services wherein user access, application, and data security are the responsibilities of the organization, and the OS, hypervisor, physical, infrastructure, and network security are the responsibilities of the cloud service provider. Based on the aforementioned cloud security shared responsibilities, which of the following cloud computing service models is enforced in Tom's organization?
A. Infrastructure-as-a-Service
B. Platform-as-a-Service
C. On-Premises
D. Software-as-a-Service
Click for Answer
A. Infrastructure-as-a-Service
Question # 4 Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider. While discussing the security of the organization's virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules. Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?
A. IBMB. AWS
C. AzureD. Google
Click for Answer
C. Azure
Answer Description Explanation:
Network Security Groups (NSGs) are used in Azure to filter network traffic to and from Azure resources within an Azure Virtual Network (VNet). NSGs contain security rules that allow or deny inbound and outbound network traffic based on several parameters such as protocol, source and destination IP address, port number, and direction (inbound or outbound).
NSG Functionality: NSGs function as a firewall for VM instances, controlling both inbound and outbound traffic at the network interface, VM, and subnet level1.
Security Rules: They consist of security rules that specify source and destination, port, and protocol to filter traffic1.
Traffic Control: By setting appropriate rules, NSGs help secure VMs from unauthorized access and ensure that only allowed traffic can flow to and from the VM1.
Azure Specific: This feature is specific to Azure and is not offered by IBM, AWS, or Google Cloud in the same manner1.
References: NSGs are a key component of Azure’s networking capabilities, providing a way to control access to VMs, services, and subnets, and are an integral part of Azure’s security infrastructure1.
Question # 5 InternSoft Solution Pvt. Ltd. is an IT company located in Boston, Massachusetts. The IT and InfoSec teams of the organization uses CASP to customize access rules and automate compliance policies. Using CASP solutions, they could access the account activities in the cloud, which makes it easy for them to achieve compliance, data security, and threat protection. What is CASP? A. It is a CASB that uses APIs
B. It is a WAF that uses proxies
C. It is a CASB that uses proxies
D. It is a RASP that uses APIs
Click for Answer
A. It is a CASB that uses APIs
Question # 6 Alice, a cloud forensic investigator, has located, a relevant evidence during his investigation of a security breach in an organization's Azure environment. As an investigator, he needs to sync different types of logs generated by Azure resources with Azure services for better monitoring. Which Azure logging and auditing feature can enable Alice to record information on the Azure subscription layer and obtain the evidence (information related to the operations performed on a specific resource, timestamp, status of the operation, and the user responsible for it)?
A. Azure Resource Logs
B. Azure Storage Analytics Logs
C. Azure Activity Logs
D. Azure Active Directory Reports
Click for Answer
C. Azure Activity Logs
Question # 7 Cosmic IT Services wants to migrate to cloud computing. Before migrating to the cloud, the organization must set business goals for cloud computing as per the guidelines of a standard IT governance body. Which standard IT governance body can help the organization to set business goals and objectives for cloud computing by offering the IT governance named COBIT (Control Objective for Information and Related Technology)?
A. International Standards Organization (ISO)B. Cloud Security Alliance (CSA)
C. Information System Audit and Control Association (ISACA)
D. Committee of Sponsoring Organizations (COSO)
Click for Answer
C. Information System Audit and Control Association (ISACA)
Answer Description Explanation:
Cosmic IT Services is looking to set business goals and objectives for cloud computing using the COBIT framework. The IT governance body that offers COBIT (Control Objectives for Information and Related Technology) is the Information System Audit and Control Association (ISACA).
COBIT Overview: COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices. It is a comprehensive framework that aligns IT goals with business objectives1.
ISACA’s Role: ISACA is the organization that developed and maintains the COBIT framework. It provides guidance, benchmarks, and other materials for managing and governing enterprise IT environments1.
Setting Business Goals: By utilizing COBIT, Cosmic IT Services can establish a structured approach to align IT processes with business goals, ensuring that their cloud computing initiatives support the overall objectives of the organization1.
Why Not the Others?:
Question # 8 Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI. Which of the following command should Simon run in the EC2 instance to disable user account passwords?
A. passwd -D < USERNAME >
B. passwd -I < USERNAME >
C. passwd -d < USERNAME >
D. passwd -L < USERNAME >
Click for Answer
D. passwd -L < USERNAME >
Answer Description Explanation:
To disable user account passwords on an Amazon EC2 Linux instance, Simon should use the command passwd -L . Here's the detailed explanation:
passwd Command: The passwd command is used to update a user's authentication tokens (passwords).
-L Option: The -L option is used to lock the password of the specified user account, effectively disabling the password without deleting the user account itself.
Security Measure: Disabling passwords ensures that the user cannot authenticate using a password, thereby enhancing the security of the instance.
References:
AWS Documentation: Securing Access to Amazon EC2 Instances
Linux man-pages: passwd(1)
Up-to-Date
We always provide up-to-date 312-40 exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our EC-Council Certified Cloud Security Engineer (CCSE) practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the 312-40 exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download Certified Cloud Security Engineer (CCSE) Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling 312-40 practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied ECCouncil customer in this time. Our customers are our asset and precious to us more than their money.
312-40 Dumps
We have recently updated ECCouncil 312-40 dumps study guide. You can use our Certified Cloud Security Engineer (CCSE) braindumps and pass your exam in just 24 hours. Our EC-Council Certified Cloud Security Engineer (CCSE) real exam contains latest questions. We are providing ECCouncil 312-40 dumps with updates for 3 months. You can purchase in advance and start studying. Whenever ECCouncil update EC-Council Certified Cloud Security Engineer (CCSE) exam, we also update our file with new questions. Passin1day is here to provide real 312-40 exam questions to people who find it difficult to pass exam
Certified Cloud Security Engineer (CCSE) can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with 312-40 dumps. ECCouncil Certifications demonstrate your competence and make your discerning employers recognize that EC-Council Certified Cloud Security Engineer (CCSE) certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive ECCouncil exam dumps will enable you to pass your certification Certified Cloud Security Engineer (CCSE) exam in just a single try. Passin1day is offering 312-40 braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download Certified Cloud Security Engineer (CCSE) dumps and access them at any device after purchase. Online EC-Council Certified Cloud Security Engineer (CCSE) practice tests are planned and designed to prepare you completely for the real ECCouncil exam condition. Free 312-40 dumps demos can be available on customer’s demand to check before placing an order.
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my ECCouncil exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your 312-40 exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your EC-Council Certified Cloud Security Engineer (CCSE) braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.