Eccouncil Certified Cloud Security Engineer (CCSE) 312-40 Exam Practice Test

Page: 1 / 14
Total 147 questions
Question 1

You are the manager of a cloud-based security platform that offers critical services to government agencies and private companies. One morning, your team receives an alert from the platform's intrusion detection system indicating that there has been a potential breach in the system. As the manager, which tool you will use for viewing and monitoring the sensitive data by scanning storage systems and reviewing the access rights

to critical resources via a single centralized dashboard?



Question 2

Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first. Which Azure service can help her in detecting the severity and creating alerts?



Question 3

An organization is developing a new AWS multitier web application with complex queries and table joins.

However, because the organization is small with limited staff, it requires high availability. Which of the following Amazon services is suitable for the requirements of the organization?



Answer : D

For a multitier web application that requires complex queries and table joins, along with the need for high availability, Amazon DynamoDB is the suitable service. Here's why:

Support for Complex Queries: DynamoDB supports complex queries and table joins through its flexible data model and secondary indexes.

High Availability: DynamoDB is designed for high availability and durability, with data replicated across multiple AWS Availability Zones1.

Managed Service: As a fully managed service, DynamoDB requires minimal operational overhead, which is ideal for organizations with limited staff.

Scalability: It can handle large amounts of traffic and data, scaling up or down as needed to meet the demands of the application.

Reference: Amazon DynamoDB is a NoSQL database service that provides fast and predictable performance with seamless scalability. It is suitable for applications that require consistent, single-digit millisecond latency at any scale1. It's a fully managed, multi-region, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications1.


Question 4

Chris Evans has been working as a cloud security engineer in a multinational company over the past 3 years. His organization has been using cloud-based services. Chris uses key vault as a key management solution because it offers easier creation of encryption keys and control over them. Which of the following public cloud service providers allows Chris to do so?



Answer : B

Azure Key Vault is a cloud service provided by Microsoft Azure. It is used for managing cryptographic keys and other secrets used in cloud applications and services. Chris Evans, as a cloud security engineer, would use Azure Key Vault for the following reasons:

Key Management: Azure Key Vault allows for the creation and control of encryption keys used to encrypt data.

Secrets Management: It can also manage other secrets such as tokens, passwords, certificates, and API keys.

Access Control: Key Vault provides secure access to keys and secrets based on Azure Active Directory identities.

Audit Logs: It offers monitoring and logging capabilities to track how and when keys and secrets are accessed.

Integration: Key Vault integrates with other Azure services, providing a seamless experience for securing application secrets.


Azure's official documentation on Key Vault, which outlines its capabilities for key management and security.

A guide on best practices for using Azure Key Vault for managing cryptographic keys and secrets.

Question 5

Sandra, who works for SecAppSol Technologies, is on a vacation. Her boss asked her to solve an urgent issue in an application. Sandra had to use applications present on her office laptop to solve this issue, and she successfully rectified it. Despite being in a different location, she could securely use the application. What type of service did the organization use to ensure that Sandra could access her office laptop from a remote area?



Answer : A

Amazon AppStream 2.0 is a fully managed application streaming service that allows users to access desktop applications from anywhere, making it the service that enabled Sandra to access her office laptop applications remotely. Here's how it works:

Application Hosting: AppStream 2.0 hosts desktop applications on AWS and streams them to a web browser or a connected device.

Secure Access: Users can access these applications securely from any location, as the service provides a secure streaming session.

Resource Optimization: It eliminates the need for high-end user hardware since the processing is done on AWS servers.

Central Management: The organization can manage applications centrally, which simplifies software updates and security.

Integration: AppStream 2.0 integrates with existing identity providers and supports standard security protocols.


AWS documentation on Amazon AppStream 2.0, detailing how it enables remote access to applications1.

An AWS blog post explaining the benefits of using Amazon AppStream 2.0 for remote application access2.

Question 6

A private IT company named Altitude Solutions conducts its operations from the cloud. The company wants to balance the interests of corporate stakeholders (higher management, employees, investors, and suppliers) to achieve control on the cloud infrastructure and facilities (such as data centers) and management of applications at the portfolio level. Which of the following represents the adherence to the higher management directing and controlling activities at various levels of the organization in a cloud environment?



Answer : B

Governance in a cloud environment refers to the mechanisms, processes, and relations used by various stakeholders to control and to operate within an organization. It encompasses the practices and policies that ensure the integrity, quality, and security of the data and services.

Here's how governance applies to Altitude Solutions:

Stakeholder Interests: Governance ensures that the interests of all stakeholders, including higher management, employees, investors, and suppliers, are balanced and aligned with the company's objectives.

Control Mechanisms: It provides a framework for higher management to direct and control activities at various levels, ensuring that cloud infrastructure and applications are managed effectively.

Strategic Direction: Governance involves setting the strategic direction of the organization and making decisions on behalf of stakeholders.

Performance Monitoring: It includes monitoring the performance of cloud services and infrastructure to ensure they meet the company's strategic goals and compliance requirements.

Risk Management: While governance includes risk management as a component, it is broader in scope, encompassing overall control and direction of the organization's operations in the cloud.


A white paper on cloud governance best practices and strategies.

Industry guidelines on IT governance in cloud computing environments.

Question 7

Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disasterrecovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss. Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel's organization?



Answer : A

The description provided indicates that the disaster recovery site is a Warm Site. Here's why:

Partially Redundant Equipment: Warm sites are equipped with some of the system hardware, software, telecommunications, and power sources.

Data Synchronization: They have provisions for daily or weekly data synchronization, which aligns with the description given.

Failover Time: Failover to a warm site typically occurs within hours or days, as mentioned.

Minimum Data Loss: Due to the regular synchronization, there is minimal data loss in the event of a failover.

Reference: A Warm Site is a type of disaster recovery site that sits between a hot site, which is fully equipped and ready to take over immediately, and a cold site, which is an empty data center that requires setup before use. The warm site's readiness and partial redundancy make it suitable for organizations that need a balance between cost and downtime.


Page:    1 / 14   
Total 147 questions