Pass the ECCouncil Certified Cloud Security Engineer (CCSE) 312-40 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

Kelsey Lewis has been working as a cloud security engineer in a BPO company that provides 24-7 customer service. Owing to the cost-effective storage and security features provided by cloud computing, her organization adopted the cloud environment 4 years ago. Kelsey implemented the TLS protocol to provide security to e-mail communications, voice over IP (VoIP) communication, web traffic, messaging clients, file transfers, and internet services [Domain Name Service (DNS) and Network Time Protocol (NTP)). Which certificate is used by TLS for communication authentication and encryption between hosts?

Options:

A.

X.507 certificates issued by the Certificate Authority


B.

X.508 certificates issued by the Certificate Authority


C.

X.506 certificate issued by the Certificate Authority


D.

X.509 certificates issued by the Certificate Authority


Expert Solution
Questions # 42:

VoxCloPro is a cloud service provider based in South America that offers all types of cloud-based services to cloud consumers. The cloud-based services provided by VoxCloPro are secure and cost-effective. Terra Soft.

Pvt. Ltd. is an IT company that adopted the cloud-based services of VoxCloPro and transferred the data and applications owned by the organization from on-premises to the VoxCloPro cloud environment. According to the data protection laws of Central and South American countries, who among the following is responsible for ensuring the security and privacy of personal data?

Options:

A.

Cloud Carrier


B.

Cloud Broker


C.

Terra Soft. Pvt. Ltd


D.

VoxCloPro


Expert Solution
Questions # 43:

Sandra, who works for SecAppSol Technologies, is on a vacation. Her boss asked her to solve an urgent issue in an application. Sandra had to use applications present on her office laptop to solve this issue, and she successfully rectified it. Despite being in a different location, she could securely use the application. What type of service did the organization use to ensure that Sandra could access her office laptop from a remote area?

Options:

A.

Amazon AppStream 2.0


B.

Amazon Elastic Transcoder Service


C.

Amazon SQS


D.

Amazon Simple Workflow


Expert Solution
Questions # 44:

Global CyberSec Pvt. Ltd. is an IT company that provides software and application services related to cybersecurity. Owing to the robust security features offered by Microsoft Azure, the organization adopted the Azure cloud environment. A security incident was detected on the Azure cloud platform. Global CyberSec Pvt. Ltd.'s security team examined the log data collected from various sources. They found that the VM was affected. In this scenario, when should the backup copy of the snapshot be taken in a blob container as a page blob during the forensic acquisition of the compromised Azure VM?

Options:

A.

After deleting the snapshot from the source resource group


B.

Before mounting the snapshot onto the forensic workstation


C.

After mounting the snapshot onto the forensic workstation


D.

Before deleting the snapshot from the source resource group


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions