Pass the ECCouncil Certified Cloud Security Engineer (CCSE) 312-40 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Chris Noth has recently joined CloudAppSec Private Ltd. as a cloud security engineer. Owing to several instances of malicious activities performed by former employees on his organization's applications and data that reside in an on-premises environment, in 2010, his organization adopted cloud computing and migrated all applications and data to the cloud. Chris would like to manage user identities in cloud-based services and applications. Moreover, he wants to reduce the risk caused by the accounts of former users (employees) by ensuring that the users who leave the system can no longer log in to the system. Therefore, he has enforced an IAM standard that can automate the provisioning and de-provisioning of users when they enter and leave the system. Which of the following IAM standards is implemented by Chris Noth?

Options:

A.

SCIM


B.

XACML


C.

OpenID


D.

OAuth


Expert Solution
Questions # 22:

FinTech Inc. is an IT company that utilizes a cloud platform to run its IT infrastructure. Employees belonging to various departments do not implement the rules and regulations framed by the IT department, which leads to fragmented control and breaches that affect the efficiency of cloud services. How can the organization effectively overcome shadow IT and unwarranted usage of cloud resources in this scenario?

Options:

A.

By implementing cloud risk management


B.

By implementing cloud governance


C.

By implementing regulatory compliance


D.

By implementing corporate compliance


Expert Solution
Questions # 23:

Scott Herman works as a cloud security engineer in an IT company located in Ann Arbor, Michigan. His organization uses Office 365 Business Premium that provides Microsoft Teams, secure cloud storage, business email, premium Office applications across devices, advanced cyber threat protection, and device management.

Which of the following cloud computing service models does Microsoft Office 365 represent?

Options:

A.

DaaS


B.

laaS


C.

PaaS


D.

SaaS


Expert Solution
Questions # 24:

A client wants to restrict access to its Google Cloud Platform (GCP) resources to a specified IP range by making a trust-list. Accordingly, the client limits GCP access to users in its organization network or grants company auditors access to a requested GCP resource only. Which of the following GCP services can help the client?

Options:

A.

Cloud IDS


B.

VPC Service Controls


C.

Cloud Router


D.

Identity and Access Management


Expert Solution
Questions # 25:

A company is a third-party vendor for several organizations and provides them customized software and products to cater to their needs. It recently moved its infrastructure and applications on cloud. Its applications are not working on the cloud as expected. The developers and testers are experiencing significant difficulty in managing and deploying the code in the cloud. Which of the following will help them with automated integration, development, testing, and deployment in the cloud?

Options:

A.

Vulnerability assessment tool


B.

DevOps


C.

SIEM


D.

Dashboard


Expert Solution
Questions # 26:

Daffod is an American cloud service provider that provides cloud-based services to customers worldwide.

Several customers are adopting the cloud services provided by Daffod because they are secure and cost-

effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the economic and national security interests of the US. Based on the given information, which law order does Daffod adhere to?

Options:

A.

FERPA


B.

CLOUD


C.

FISMA


D.

ECPA


Expert Solution
Questions # 27:

Kenneth Danziger has been working as a cloud security engineer in a multinational company. His organization uses AWS cloud-based services. Kenneth would like to review the changes in configuration and the relationships between AWS resources, examine the detailed resource configuration history, and determine the overall compliance of his organization against the configurations specified in internal guidelines. Which of the following AWS services enables Kenneth to assess, audit, and evaluate the configuration of AWS resources?

Options:

A.

AWS CloudTrail


B.

AWS CloudFormation


C.

AWS Config


D.

AWS Security Hub


Expert Solution
Questions # 28:

IntSecureSoft Solutions Pvt. Ltd. is an IT company that develops software and applications for various educational institutions. The organization has been using Google cloud services for the past 10 years. Tara Reid works as a cloud security engineer in IntSecureSoft Solutions Pvt. Ltd. She would like to identify various misconfigurations and vulnerabilities such as open storage buckets, instances that have not implemented SSL, and resources without an enabled Web UI. Which of the following is a native scanner in the Security Command Center that assesses the overall security state and activity of virtual machines, containers, network, and storage along with the identity and access management policies?

Options:

A.

Log Analytics Workspace


B.

Google Front End


C.

Security Health Analytics


D.

Synapse Analytics


Expert Solution
Questions # 29:

Richard Branson works as a senior cloud security engineer in a multinational company. Richard wants to see the actions performed on AWS resources, the services accessed, users who made requests, and the users or services that performed an action on an AWS service. Which of the following AWS services will provide a log of all system and user actions that affect AWS resources within Richard's organizational AWS account?

Options:

A.

Amazon Route 53 Security


B.

Amazon CloudFront Security


C.

Amazon CloudTrail Security


D.

Amazon CloudWatch Security


Expert Solution
Questions # 30:

TechGloWorld is an IT company that develops cybersecurity software and applications for various customers across the globe. Owing to the cost-effective security and storage services provided by AWS. TechGloWorld has adopted AWS cloud-based services. A new employee, named Tom Harrison, has joined TechGloWorld as a cloud security engineer. The team leader of cloud security engineers would like to add an 1AM user named Tom to the 1AM group named Admins. Which of the following commands should be used by the TechGloWorld security team leader?

Options:

A.

aws iam --group-name Admins -user-name Tom add-user-to-group


B.

aws iam —group-name Admins —user-name Tarn-add-user-to-group


C.

aws iam add-user-to-group —user-name Tom —group-name Admins


D.

aws iam add-user-to-group —user-name Torn —group-name Admin


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions