Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 312-40 Practice Exam with Questions & Answers | Set: 3

Questions 21

An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured. Which tool's high availability settings must be checked for this?

Options:
A.

MySQL Database

B.

Always on Availability Groups (AGs)

C.

SQL Server Database Mirroring (DBM)

D.

Google Cloud SQL

ECCouncil 312-40 Premium Access
Questions 22

Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first. Which Azure service can help her in detecting the severity and creating alerts?

Options:
A.

Windows Defender

B.

Cloud Operations Suite

C.

Microsoft Defender for Cloud

D.

Cloud DLP

Questions 23

An organization wants to implement a zero-trust access model for its SaaS application on the GCP as well as its on-premises applications. Which of the following GCP services can be used to eliminate the need for setting up a company-wide VPN and implement the RBAC feature to verify employee identities to access organizational applications?

Options:
A.

Cloud Endpoints

B.

Identity-Aware Proxy (IAP)

C.

Cloud Security Scanner

D.

Web Application and API Protection

Questions 24

Cindy Williams has been working as a cloud security engineer in an IT company situated in Austin, Texas. Owing to the robust security and cost-effective features provided by AWS, her organization adopted AWS cloud-based services. Cindy has deployed an application in the Amazon Elastic Compute Cloud (EC2) instance.

Which of the following cloud computing service model does the Amazon EC2 instance represent?

Options:
A.

PaaS

B.

laaS

C.

SaaS

D.

DaaS

Questions 25

A BPO company would like to expand its business and provide 24 x 7 customer service. Therefore, the organization wants to migrate to a fully functional cloud environment that provides all features with minimum maintenance and administration. Which cloud service model should it consider?

Options:
A.

laaS

B.

PaaS

C.

RaaS

D.

SaaS

Questions 26

A private IT company named Altitude Solutions conducts its operations from the cloud. The company wants to balance the interests of corporate stakeholders (higher management, employees, investors, and suppliers) to achieve control on the cloud infrastructure and facilities (such as data centers) and management of applications at the portfolio level. Which of the following represents the adherence to the higher management directing and controlling activities at various levels of the organization in a cloud environment?

Options:
A.

Risk Management

B.

Governance

C.

Corporate Compliance

D.

Regulatory Compliance

Questions 27

Gabriel Bateman has been working as a cloud security engineer in an IT company for the past 5 years. Owing to the recent onset of the COVID-19 pandemic, his organization has given the provision to work from home to all employees. Gabriel's organization uses Microsoft Office 365 that allows all employees access files, emails, and other Office programs securely from various locations on multiple devices. Who among the following is responsible for patch management in Microsoft Office 365?

Options:
A.

Both Gabriel's organization and Microsoft share responsibilities for patch management

B.

Gabriel's organization should outsource patch management to a third party

C.

Gabriel's organization is entirely responsible for patch management

D.

Microsoft is entirely responsible for patch management

Questions 28

Rebecca Mader has been working as a cloud security engineer in an IT company located in Detroit, Michigan. Her organization uses AWS cloud-based services. An application is launched by a developer on an EC2 instance that needs access to the S3 bucket (photos). Rebecca created a get-pics service role and attached it to the EC2 instance. This service role comprises a permission policy that allows read-only access to the S3 bucket and a trust policy that allows the instance to assume the role and retrieve temporary credentials. The application uses the temporary credentials of the role to access the photo bucket when it runs on the instance. Does the developer need to share or manage credentials or does the admin need to grant permission to the developer to access the photo bucket?

Options:
A.

No, the developer never has to share or manage credentials, but the admin has to grant permission to the developer to access the photo bucket

B.

Yes, the developer has to share or manage credentials, but the admin does not have to grant

permission to the developer to access the photo bucket

C.

Yes, the developer should share or manage credentials and the admin should grant permission to the developer to access the photo bucket

D.

No, the developer never has to share or manage credentials and the admin does not have to grant

permission to the developer to access the photo bucket

Questions 29

TechGloWorld is an IT company that develops cybersecurity software and applications for various customers across the globe. Owing to the cost-effective security and storage services provided by AWS. TechGloWorld has adopted AWS cloud-based services. A new employee, named Tom Harrison, has joined TechGloWorld as a cloud security engineer. The team leader of cloud security engineers would like to add an 1AM user named Tom to the 1AM group named Admins. Which of the following commands should be used by the TechGloWorld security team leader?

Options:
A.

aws iam --group-name Admins -user-name Tom add-user-to-group

B.

aws iam —group-name Admins —user-name Tarn-add-user-to-group

C.

aws iam add-user-to-group —user-name Tom —group-name Admins

D.

aws iam add-user-to-group —user-name Torn —group-name Admin

Questions 30

Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI. Which of the following command should Simon run in the EC2 instance to disable user account passwords?

Options:
A.

passwd -D < USERNAME >

B.

passwd -I < USERNAME >

C.

passwd -d < USERNAME >

D.

passwd -L < USERNAME >

Exam Code: 312-40
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Cloud Security Engineer (CCSE)
Last Update: Jul 12, 2025
Questions: 147