Eccouncil 312-40 Certified Cloud Security Engineer (CCSE) Exam Practice Test

Page: 1 / 14
Total 147 questions
Question 1

Jimmi Simpson has been working as a cloud security engineer in an IT company situated in Uvoni

a. Michigan. His organization uses Microsoft Azure's cloud-based services. Jimml wants a cloud-based, scalable SIEM and SOAP solution that uses threat intelligence and provides intelligent security analytics across his organization. Which of the following Microsoft Azure services provides of single solution for threat visibility, alert detection, threat response, and proactive hunting that reduces the number of attacks, provides a birds-eye view across the organization, generates high volumes of alerts, and ensures long resolution time frames?



Answer : C


Question 2

Ocular Private Ltd. is an IT company that develops software related to graphic design. The organization has been using Google cloud services. Margot Robbie has been working as a cloud security engineer in Ocular Private Ltd. over the past three years. She uses the CCP Cloud Operations Suite (formerly Stack Driver} logging and monitoring tool to monitor and debug CCP hosted applications. Margot would like to monitor a compute engine instance with cloud monitoring; therefore, she created a compute engine instance, then she installed the cloud monitoring agent. Which of the following command can Margot use to start the cloud monitoring agent?



Answer : B


Question 3

Richard Branson works as a senior cloud security engineer in a multinational company. Richard wants to see the actions performed on AWS resources, the services accessed, users who made requests, and the users or services that performed an action on an AWS service. Which of the following AWS services will provide a log of all system and user actions that affect AWS resources within Richard's organizational AWS account?



Answer : D


Question 4

Alex Hales works as a cloud security specialist in an IT company. He wants to make his organization's business faster and more efficient by implementing Security Assertion Mark-up Language (SAML) that will enable employees to securely access multiple cations with a single set of credentials. What is SAML?



Answer : C


Question 5

Rachael Taylor works as a cloud security engineer in CyTech Private Ltd whose previous cloud service provider used to levy high charges for resource utilization. Rachael would like to check resource utilization to Identify resources that are not in use. but the cloud service provider did not have the provision that allows cloud consumers to view resource utilization. Because AWS provides various cloud-based services, including resource utilization and a secure environment to cloud consumers, her organization adopted AWS cloud-based services. Rachael would like to view operational performance, resource utilization, and overall demand patterns, including metrics such as disk reads and writes, CPU utilization, and network traffic. Which of the following AWS services fulfills Racheal's requirements?



Answer : A


Question 6

VoxCloPro is a cloud service provider based in South America that offers all types of cloud-based services to cloud consumers. The cloud-based services provided by VoxCloPro are secure and cost-effective. Terra Soft.

Pvt. Ltd. is an IT company that adopted the cloud-based services of VoxCloPro and transferred the data and applications owned by the organization from on-premises to the VoxCloPro cloud environment. According to the data protection laws of Central and South American countries, who among the following is responsible for ensuring the security and privacy of personal data?



Question 7

Jack Jensen works as a cloud security engineer in an IT company located in Madison, Wisconsin. Owing to the various security services provided by Google, in 2012, his organization adopted Google cloud-based services. Jack would like to identify security abnormalities to secure his organizational data and workload. Which of the following is a built-in feature in the Security Command Center that utilizes behavioral signals to detect security abnormalities such as unusual activity and leaked credentials in virtual machines or GCP projects?



Answer : D

The Security Command Center (SCC) in Google Cloud provides various services to detect and manage security risks. Among the options provided, Security Health Analytics is the built-in feature that utilizes behavioral signals to detect security abnormalities.

Security Health Analytics: It is a service within SCC that performs automated security scans of Google Cloud resources to detect misconfigurations and compliance violations with respect to established security benchmarks1.

Detection Capabilities: Security Health Analytics can identify a range of security issues, including misconfigured network settings, insufficient access controls, and potential data exfiltration activities. It helps in detecting unusual activity that could indicate a security threat1.

Behavioral Signals: By analyzing behavioral signals, Security Health Analytics can detect anomalies that may signify leaked credentials or other security risks in virtual machines or GCP projects1.

Why Not the Others?:

Anomaly Detector is not a specific feature within SCC.

Cloud Armor is primarily a network security service that provides protection against DDoS attacks and other web-based threats, not specifically for detecting security abnormalities based on behavioral signals.

Cloud Anomaly Detection is not listed as a built-in feature in the SCC documentation.


Google Cloud Documentation: Security Command Center overview1.

Google Cloud Blog: Investigate threats surfaced in Google Cloud's Security Command Center2.

Making Science Blog: Security Command Center: Strengthen your company's security with Google Cloud3.

Page:    1 / 14   
Total 147 questions