Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-40 - EC-Council Certified Cloud Security Engineer (CCSE)

Page: 4 / 5
Total 147 questions

WinSun Computers is a software firm that adopted cloud computing. To keep the cloud environment secure, the organization must ensure that it adheres to the regulations, controls, and rules framed by its management in the cloud environment. Which of the following represents the adherence to these regulations, controls, and rules framed by the organization in this scenario?

A.

Risk Management

B.

Regulatory Compliance

C.

Governance

D.

Corporate Compliance

Global InfoSec Solution Pvt. Ltd. is an IT company that develops mobile-based software and applications. For smooth, secure, and cost-effective facilitation of business, the organization uses public cloud services. Now, Global InfoSec Solution Pvt. Ltd. is encountering a vendor lock-in issue. What is vendor lock-in in cloud computing?

A.

It is a situation in which a cloud consumer cannot switch to another cloud service broker without substantial switching costs

B.

It is a situation in which a cloud consumer cannot switch to a cloud carrier without substantial switching costs

C.

It is a situation in which a cloud service provider cannot switch to another cloud service broker without substantial switching costs

D.

It is a situation in which a cloud consumer cannot switch to another cloud service provider without substantial switching costs

The tech giant TSC uses cloud for its operations. As a cloud user, it should implement an effective risk management lifecycle to measure and monitor high and critical risks regularly. Additionally, TSC should define what exactly should be measured and the acceptable variance to ensure timely mitigated risks. In this case, which of the following can be used as a tool for cloud risk management?

A.

Information System Audit and Control Association

B.

Cloud Security Alliance

C.

Committee of Sponsoring Organizations

D.

CSA CCM Framework

Bruce McFee works as a cloud security engineer in an IT company. His organization uses AWS cloud-based services. Because Amazon CloudFront offers low-latency and high-speed data delivery through a user-friendly environment, Bruce's organization uses the CloudFront content delivery network (CDN) web service for the fast and secure distribution of data to various customers throughout the world. How does CloudFront accelerate content distribution?

A.

By sending the requests of end users to the nearest edge locations

B.

By restricting the requests of end users from the nearest edge locations

C.

By routing the requests of end users to the original source

D.

By forwarding the requests of end users to the original source

Maria Howell has been working as a senior cloud security engineer in an loT manufacturing company. Her organization designs, develops, and tests loT devices. It uses Microsoft Azure cloud-based services. Maria had no knowledge of data science and the various ML and Al models used for data analysis, but she would like to analyze the time-series data generated from loT devices to monitor and identify abnormalities. Which of the following is an Al-based Azure service that can help Maria in monitoring and identifying the abnormalities in time series data without requiring any knowledge of machine learning?

A.

Application Insights

B.

Azure Sentinel

C.

Cloud App Security

D.

Anomaly Detector

CyTech Private Ltd. is an IT company located in Jacksonville. Florida. The organization would like to eliminate a single point of failure: therefore. In 2017. the organization adopted a cloud computing service model in which the cloud service provider completely handles the failover. CyTech Private Ltd. added automated failover capabilities to its cloud environment and it has boon testing the functionality to ensure that it is working efficiently. In which of the following cloud computing service models, failover is completely handled by the cloud service provider?

A.

laaS

B.

PaaS

C.

SaaS

D.

DaaS

The TCK Bank adopts cloud for storing the private data of its customers. The bank usually explains its information sharing practices to its customers and safeguards sensitive data. However, there exist some security loopholes in its information sharing practices. Therefore, hackers could steal the critical data of the bank's customers. In this situation, under which cloud compliance framework will the bank be penalized?

A.

GLBA

B.

ITAR

C.

NIST

D.

GDPR

Richard Branson works as a senior cloud security engineer in a multinational company. Richard wants to see the actions performed on AWS resources, the services accessed, users who made requests, and the users or services that performed an action on an AWS service. Which of the following AWS services will provide a log of all system and user actions that affect AWS resources within Richard's organizational AWS account?

A.

Amazon Route 53 Security

B.

Amazon CloudFront Security

C.

Amazon CloudTrail Security

D.

Amazon CloudWatch Security

The e-commerce platform www.evoucher.com observes overspending 15% to 30% due to unawareness of the mistakes in threat detection and security governance while using the services of its cloud provider AWS. It feels it requires a well-thought-out roadmap to improve its cloud journey. How can the company accelerate its cloud journey with desired outcomes and business value?

A.

By following AWS CAF

B.

By following AWS SMPM

C.

By following AWS IAM

D.

By following Amazon ELB

GlobalCloud is a cloud service provider that offers various cloud-based secure and cost-effective services to cloud consumers. The customer base of this organization increased within a short period; thus, external auditing was performed on GlobalCloud. The auditor used spreadsheets, databases, and data analyzing software to analyze a large volume of data. Based on the given information, which cloud-based audit method was used by the auditor to collect the objective evidence?

A.

Gap Analysis

B.

CAAT

C.

Striping

D.

Re-Performance