ExamGecko
Home / ECCouncil / 312-40 / List of questions
Ask Question

ECCouncil 312-40 Practice Test - Questions Answers, Page 15

Add to Whishlist

List of questions

Question 141

Report Export Collapse

Jimmi Simpson has been working as a cloud security engineer in an IT company situated in Uvonia. Michigan. His organization uses Microsoft Azure's cloud-based services. Jimml wants a cloud-based, scalable SIEM and SOAP solution that uses threat intelligence and provides intelligent security analytics across his organization. Which of the following Microsoft Azure services provides of single solution for threat visibility, alert detection, threat response, and proactive hunting that reduces the number of attacks, provides a birds-eye view across the organization, generates high volumes of alerts, and ensures long resolution time frames?

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

CyTech Private Ltd. is an IT company located in Jacksonville. Florida. The organization would like to eliminate a single point of failure: therefore. In 2017. the organization adopted a cloud computing service model in which the cloud service provider completely handles the failover. CyTech Private Ltd. added automated failover capabilities to its cloud environment and it has boon testing the functionality to ensure that it is working efficiently. In which of the following cloud computing service models, failover is completely handled by the cloud service provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse

An Azure subscription owner, Arial Solutions, gets notified by Microsoft (by default} when a high-severity alert (email notification) is triggered. The cloud security engineer would like to send these security alerts to a specific Individual or anyone with particular Azure roles for a subscription, and modify the severity levels for which alerts are sent. How con the cloud security engineer configure these alerts?

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

Richard Branson works as a senior cloud security engineer in a multinational company. Owing to the cost-effective security features and services provided by cloud computing, his organization uses cloud-based services. Richard deliberately wants to cause problems in an application/software system deployed in the production environment as a part of the testing strategy and analyze how the application/software system deals with the disruption, detects vulnerabilities, and fixes them. Which of the following refers to the process of experimenting on a software system that is deployed in production to check the system's capability to withstand sudden and unexpected conditions?

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

Global CloudEnv is a cloud service provider that provides various cloud-based services to cloud consumers. The cloud service provider adheres to the framework that can be used as a tool to systematically assess cloud implementation by providing guidance on the security controls that should be implemented by specific actors within the cloud supply chain. It is used as the standard to assess the security posture of organizations on the Security, Trust, Assurance, and Risk (STAR) registry. Based on the given information, which of the following cybersecurity control frameworks does Global CloudEnv adhere to?

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

For securing data, an AWS customer created a key in the Alabama region to encrypt their data in the California region. Two users were added to the key along with an external AWS account. When the AWS customer attempted to encrypt an S3 object, they observed that the key is not listed. What is the reason behind this?

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

TechGloWorld is an IT company that develops cybersecurity software and applications for various customers across the globe. Owing to the cost-effective security and storage services provided by AWS. TechGloWorld has adopted AWS cloud-based services. A new employee, named Tom Harrison, has joined TechGloWorld as a cloud security engineer. The team leader of cloud security engineers would like to add an 1AM user named Tom to the 1AM group named Admins. Which of the following commands should be used by the TechGloWorld security team leader?

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

Ryan has worked as a senior cloud security engineer over the past five years in an IT company. His organization uses Google cloud-based services because it provides live migration of VM. improved performance, robust security, better pricing compared to competitors. Ryan is using Cloud Endpoints to protect and manage APIs. Using Cloud Endpoints, ho is controlling access to APIs and validating every call with web tokens and Google API keys. Which of the following web tokens can validate every call in Cloud Endpoints?

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

Lexie Roth works as a cloud security engineer in an IT company located in Boston, Massachusetts. Her organization generates a huge amount of data. To increase the storage size, speed, and fault tolerance, Lexie would like to configure and create a RAID. Therefore, she created a RAID on windows Server 2016, which includes block level striping with a distributed parity. The parity information is distributed among all drives. except one. The data chunks in the RAID are larger than the regular I/O size, but they can be re-sized. To prevent data loss after a drive fails, data are calculated from the distributed parity. The RAID configured by Lexie requires at least three disks, but for robust performance, Lexie used seven disks. Based on the given information, which of the following RAID was configured and created by Lexie?

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

Two cloud security engineers, Lin and Messy, observed unexpected changes such as slower response time in the behavior of the Azure storage services used by applications. They need to study the tables, queues, and blob logs and identify the root cause of the slow response to remediate the issue. How can both Lin and Messy ensure the operational security of Azure operational?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15
Search

Related questions