Pass the ECCouncil Certified Cloud Security Engineer (CCSE) 312-40 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

The e-commerce platform www.evoucher.com observes overspending 15% to 30% due to unawareness of the mistakes in threat detection and security governance while using the services of its cloud provider AWS. It feels it requires a well-thought-out roadmap to improve its cloud journey. How can the company accelerate its cloud journey with desired outcomes and business value?

Options:

A.

By following AWS CAF


B.

By following AWS SMPM


C.

By following AWS IAM


D.

By following Amazon ELB


Expert Solution
Questions # 12:

Andrew Gerrard has been working as a cloud security engineer in an MNC for the past 3 years. His organization uses cloud-based services and it has implemented a DR plan. Andrew wants to ensure that the DR plan works efficiently and his organization can recover and continue with its normal operation when a disaster strikes.

Therefore, the owner of the DR plan, Andrew, and other team members involved in the development and implementation of the DR plan examined it to determine the inconsistencies and missing elements. Based on the given scenario, which of the following type of DR testing was performed in Andrew's organization?

Options:

A.

Plan Review


B.

Simulation


C.

Stimulation


D.

Table-top exercise


Expert Solution
Questions # 13:

Rachael Taylor works as a cloud security engineer in CyTech Private Ltd whose previous cloud service provider used to levy high charges for resource utilization. Rachael would like to check resource utilization to Identify resources that are not in use. but the cloud service provider did not have the provision that allows cloud consumers to view resource utilization. Because AWS provides various cloud-based services, including resource utilization and a secure environment to cloud consumers, her organization adopted AWS cloud-based services. Rachael would like to view operational performance, resource utilization, and overall demand patterns, including metrics such as disk reads and writes, CPU utilization, and network traffic. Which of the following AWS services fulfills Racheal’s requirements?

Options:

A.

Amazon CloudWatch Security


B.

Amazon CloudTrail Security


C.

Amazon Route 53 Security


D.

Amazon CloudFront Security


Expert Solution
Questions # 14:

Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disasterrecovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss. Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel's organization?

Options:

A.

Warm Site


B.

Cold Site


C.

Remote site


D.

Hot Site


Expert Solution
Questions # 15:

Jordon Bridges works as a cloud security engineer in a multinational company. His organization uses Google cloud-based services (GC) because Google cloud provides robust security services, better pricing than competitors, improved performance, and redundant backup. Using IAM security configuration, Jordon implemented the principle of least privilege. A GC IAM member could be a Google account, service account, Google group, G Suite, or cloud identity domain with an identity to access Google cloud resources. Which of the following identities is used by GC IAM members to access Google cloud resources?

Options:

A.

For Google Account, Google group, and service account, the identity used is the domain name,

whereas in G Suite and cloud identity domain, the identity used is an email address.


B.

For Google Account, Google group, and service account, the identity used is an email address,

whereas in G Suite and cloud identity domain, the identity used is the domain name.


C.

For Google Account, Google group, and G suite, the identity used is the domain name, whereas in

service account and cloud identity domain, the identity used is an email address.


D.

For Google Account, Google group, and G suite, the identity used is an email address, whereas in

service account and cloud identity domain, the identity used is the domain name.


Expert Solution
Questions # 16:

Global SoftTechSol is a multinational company that provides customized software solutions and services to various clients located in different countries. It uses a public cloud to host its applications and services. Global SoftTechSol uses Cloud Debugger to inspect the current state of a running application in real-time, find bugs, and understand the behavior of the code in production. Identify the service provider that provides the Cloud Debugger feature to Global SoftTechSol?

Options:

A.

Google


B.

AWS


C.

IBM


D.

Azure


Expert Solution
Questions # 17:

Lexie Roth works as a cloud security engineer in an IT company located in Boston, Massachusetts. Her organization generates a huge amount of data. To increase the storage size, speed, and fault tolerance, Lexie would like to configure and create a RAID. Therefore, she created a RAID on windows Server 2016, which includes block level striping with a distributed parity. The parity information is distributed among all drives. except one. The data chunks in the RAID are larger than the regular I/O size, but they can be re-sized. To prevent data loss after a drive fails, data are calculated from the distributed parity. The RAID configured by Lexie requires at least three disks, but for robust performance, Lexie used seven disks. Based on the given information, which of the following RAID was configured and created by Lexie?

Options:

A.

RAID 3


B.

RAID 5


C.

RAID1


D.

RAID 0


Expert Solution
Questions # 18:

Georgia Lyman works as a cloud security engineer in a multinational company. Her organization uses cloud-based services. Its virtualized networks and associated virtualized resources encountered certain capacity limitations that affected the data transfer performance and virtual server communication. How can Georgia eliminate the data transfer capacity thresholds imposed on a virtual server by its virtualized environment?

Options:

A.

By allowing the virtual appliance to bypass the hypervisor and access the I/O card of the physical server directly


B.

By restricting the virtual appliance to bypass the hypervisor and access the I/O card of the physical server directly


C.

By restricting the virtual server to bypass the hypervisor and access the I/O card of the physical server directly


D.

By allowing the virtual server to bypass the hypervisor and access the I/O card of the physical server directly


Expert Solution
Questions # 19:

Scott Herman works as a cloud security engineer in an IT company. His organization has deployed a 3-tier web application in the same Google Cloud Virtual Private Cloud. Each tier (web interface (UI), API, and database) is scaled independently of others. Scott Herman obtained a requirement that the network traffic should always access the database using the API and any request coming directly from the web interface to the database should not be allowed. How should Scott configure the network with minimal steps?

Options:

A.

By adding tags to each tier and setting up firewall rules to allow the desired traffic flow


B.

By adding tags to each tier and setting up routes to allow the desired traffic flow


C.

By setting up software-based firewalls on individual VMs


D.

By adding each tier to a different subnetwork


Expert Solution
Questions # 20:

InternSoft Solution Pvt. Ltd. is an IT company located in Boston, Massachusetts. The IT and InfoSec teams of the organization uses CASP to customize access rules and automate compliance policies. Using CASP solutions, they could access the account activities in the cloud, which makes it easy for them to achieve compliance, data security, and threat protection. What is CASP?

Options:

A.

It is a CASB that uses APIs


B.

It is a WAF that uses proxies


C.

It is a CASB that uses proxies


D.

It is a RASP that uses APIs


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions