Eccouncil 312-40 Certified Cloud Security Engineer (CCSE) Exam Practice Test

Page: 1 / 14
Total 147 questions
Question 1

Maria Howell has been working as a senior cloud security engineer in an loT manufacturing company. Her organization designs, develops, and tests loT devices. It uses Microsoft Azure cloud-based services. Maria had no knowledge of data science and the various ML and Al models used for data analysis, but she would like to analyze the time-series data generated from loT devices to monitor and identify abnormalities. Which of the following is an Al-based Azure service that can help Maria in monitoring and identifying the abnormalities in time series data without requiring any knowledge of machine learning?



Answer : B


Question 2

Frances Fisher has been working as a cloud security engineer in a multinational company. Her organization uses Microsoft Azure cloud-based services. Frances created a resource group (devResourceGroup); then, she created a virtual machine (devVM) in that resource group. Next. Frances created a Bastion host for the virtual machine (devVM) and she connected the virtual machine using Bastion from the Azure portal. Which of the following protocols Is used by Azure Bastion to provide secure connectivity to Frances' virtual machine (devVM) from the Azure portal?



Answer : A


Question 3

SecureSoft Solutions Pvt. Ltd. is an IT company that develops mobile-based applications. Owing to the secure and cost-effective cloud-based services provided by Google, the organization migrated its applications and data from on premises environment to Google cloud. Sienna Miller, a cloud security engineer, selected the Coldlinc Storage class for storing data in the Google cloud storage bucket. What is the minimum storage duration for Coldline Storage?



Answer : D


Question 4

Billy Pratt works as a cloud security engineer in an MNC. In 2012, his organization transferred all applications and data into an AWS cloud environment. Billy would like to analyze, investigate, and identify the root cause of malicious activities in his organization's AWS cloud environment. Which of the following Amazon services automatically collects data from various AWS resources and utilizes machine learning, statistical analysis, and graph theory to provide a unified and interactive view of resources and users that would help Billy in determining the root cause of suspicious activities?



Answer : C


Question 5

Kelsey Lewis has been working as a cloud security engineer in a BPO company that provides 24-7 customer service. Owing to the cost-effective storage and security features provided by cloud computing, her organization adopted the cloud environment 4 years ago. Kelsey implemented the TLS protocol to provide security to e-mail communications, voice over IP (VoIP) communication, web traffic, messaging clients, file transfers, and internet services [Domain Name Service (DNS) and Network Time Protocol (NTP)). Which certificate is used by TLS for communication authentication and encryption between hosts?



Answer : D


Question 6

An organization wants to securely connect to the AWS environment with a speed of 20 Gbps directly through its data centers, branch offices, and colocation facilities to ensure that its customers can securely access public (objects stored in Amazon S3) and private (limited access features such as VPC) resources by bypassing the internet service providers in the path. Which of the following AWS services can be helpful for the organization?



Answer : C


Question 7

Karen Gillan has recently joined an IT company as a cloud security engineer. Her organization would like to adopt cloud-based services to provide 24 x 7 customer support to its clients. It wants to transfer its customer database and transaction details along with the applications used for managing and supporting its customers.

Before migrating to cloud, which of the following analyses should be performed by Karen on the security capabilities and services provided by cloud service providers to understand the security requirements of the organization and those provided by the cloud service provider?



Answer : C

Before migrating to cloud services, Karen Gillan should perform a Gap Analysis to understand the security requirements of her organization and compare them with the security capabilities and services provided by cloud service providers.

Gap Analysis Purpose: A Gap Analysis is used to compare the current state of an organization's security posture against a desired future state or standard. This analysis helps identify the gaps in security that need to be addressed before moving to the cloud1.

Conducting Gap Analysis:

Assess Current Security Posture: Karen should evaluate the existing security measures, including data security practices, access controls, and incident response plans.

Identify Security Requirements: Determine the security requirements for the customer database and transaction details, as well as the applications used for managing and supporting customers.

Compare with Cloud Provider's Offerings: Review the security capabilities and services offered by the cloud service providers to see if they meet the organization's security requirements.

Identify Gaps: Highlight any discrepancies between the organization's security needs and the cloud provider's offerings.

Outcome of Gap Analysis: The outcome will be a clear understanding of what security measures are in place, what is lacking, and what the cloud provider can offer. This will guide Karen in making informed decisions about additional security controls or changes needed for a secure cloud migration.


Best practices to ensure data security during cloud migration2.

Challenges and best practices for cloud migration security3.

Security in the cloud: Best practices for safe migration4.

Page:    1 / 14   
Total 147 questions