ExamGecko
Home / ECCouncil / 312-40 / List of questions
Ask Question

ECCouncil 312-40 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

GlobalCloud is a cloud service provider that offers various cloud-based secure and cost-effective services to cloud consumers. The customer base of this organization increased within a short period; thus, external auditing was performed on GlobalCloud. The auditor used spreadsheets, databases, and data analyzing software to analyze a large volume of data. Based on the given information, which cloud-based audit method was used by the auditor to collect the objective evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

Global SoftTechSol is a multinational company that provides customized software solutions and services to various clients located in different countries. It uses a public cloud to host its applications and services. Global SoftTechSol uses Cloud Debugger to inspect the current state of a running application in real-time, find bugs, and understand the behavior of the code in production. Identify the service provider that provides the Cloud Debugger feature to Global SoftTechSol?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

TeratInfo Pvt. Ltd. is an IT company that develops software products and applications for financial organizations. Owing to the cost-effective storage features and robust services provided by cloud computing, TeratInfo Pvt. Ltd. adopted cloud-based services. Recently, its security team observed a dip in the organizational system performance. Susan, a cloud security engineer, reviewed the list of publicly accessible resources, security groups, routing tables, ACLs, subnets, and IAM policies. What is this process called?

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

Teresa Ruiz works as a cloud security engineer in an IT company. In January 2021, the data deployed by her in the cloud environment was corrupted, which caused a tremendous loss to her organization. Therefore, her organization changed its cloud service provider. After deploying the workload and data in the new service provider's cloud environment, Teresa backed up the entire data of her organization. A new employee, Barbara Houston, who recently joined Teresa's organization as a cloud security engineer, only backed up those files that changed since the last executed backup. Which type of backup was performed by Barbara in the cloud?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

YourTrustedCloud is a cloud service provider that provides cloud-based services to several multinational companies. The organization adheres to various frameworks and standards. YourTrustedCloud stores and processes credit card and payment-related data in the cloud environment and ensures the security of transactions and the credit card processing system. Based on the given information, which of the following standards does YourTrustedCloud adhere to?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

Kevin Williamson has been working as a cloud security engineer in a startup IT company. The business performed by his organization does not require live updating. A DRaaS company provided a disaster recovery site to Kevin's organization with little or no equipment, backup services with no network connectivity, it does not perform automatic failover. and involves data synchronization with a high risk of data loss. Based on the given information, which of the following disaster recovery sites is provided by the DRaaS company to Kevin's organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

Dave Allen works as a cloud security engineer in an IT company located in Baltimore, Maryland. His organization uses cloud-based services; it also uses the Network Watcher regional service to monitor and diagnose problems at the network level. It contains network diagnostic and visualization tools that help in understanding, diagnosing, and obtaining visibility into the network in a cloud environment. This service helped Dave in detecting network vulnerabilities, monitoring network performance, and ensuring secure cloud operations. Which of the following cloud service providers offers the Network Watcher service?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

Rebecca Mader has been working as a cloud security engineer in an IT company located in Detroit, Michigan. Her organization uses AWS cloud-based services. An application is launched by a developer on an EC2 instance that needs access to the S3 bucket (photos). Rebecca created a get-pics service role and attached it to the EC2 instance. This service role comprises a permission policy that allows read-only access to the S3 bucket and a trust policy that allows the instance to assume the role and retrieve temporary credentials. The application uses the temporary credentials of the role to access the photo bucket when it runs on the instance. Does the developer need to share or manage credentials or does the admin need to grant permission to the developer to access the photo bucket?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

Kelsey Lewis has been working as a cloud security engineer in a BPO company that provides 24-7 customer service. Owing to the cost-effective storage and security features provided by cloud computing, her organization adopted the cloud environment 4 years ago. Kelsey implemented the TLS protocol to provide security to e-mail communications, voice over IP (VoIP) communication, web traffic, messaging clients, file transfers, and internet services [Domain Name Service (DNS) and Network Time Protocol (NTP)). Which certificate is used by TLS for communication authentication and encryption between hosts?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

Billy Pratt works as a cloud security engineer in an MNC. In 2012, his organization transferred all applications and data into an AWS cloud environment. Billy would like to analyze, investigate, and identify the root cause of malicious activities in his organization's AWS cloud environment. Which of the following Amazon services automatically collects data from various AWS resources and utilizes machine learning, statistical analysis, and graph theory to provide a unified and interactive view of resources and users that would help Billy in determining the root cause of suspicious activities?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15
Search

Related questions