EC-Council 312-40 Exam (page: 2)
EC-Council Certified Cloud Security Engineer (CCSE)
Updated on: 31-Mar-2026

Viewing Page 2 of 26

Daffod is an American cloud service provider that provides cloud-based services to customers worldwide.

Several customers are adopting the cloud services provided by Daffod because they are secure and cost-

effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the economic and national security interests of the US. Based on the given information, which law order does Daffod adhere to?

  1. FERPA
  2. CLOUD
  3. FISMA
  4. ECPA

Answer(s): C

Explanation:

Daffod, as an American cloud service provider complying with the cloud computing law that emphasizes the importance of information security for economic and national security interests, adheres to the Federal Information Security Management Act (FISMA). Here's why:

FISMA Overview: FISMA is a US law enacted to protect government information, 1.
operations, and assets against natural or man-made threats.

Importance of Information Security: FISMA requires that all federal agencies 2.

develop, document, and implement an information security and protection program.

Relevance to Daffod: As Daffod complies with this law, it ensures that its cloud 3.
services are secure and adhere to national security standards, making it a trusted provider for secure and cost-effective cloud services.


Reference:

1. NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations

2. Federal Information Security Modernization Act (FISMA)



Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud- based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI.
Which of the following command should Simon run in the EC2 instance to disable user account passwords?

  1. passwd -D < USERNAME >
  2. passwd -I < USERNAME >
  3. passwd -d < USERNAME >
  4. passwd -L < USERNAME >

Answer(s): D

Explanation:

To disable user account passwords on an Amazon EC2 Linux instance, Simon should use the command passwd -L <USERNAME>. Here's the detailed explanation:

passwd Command: The passwd command is used to update a user's authentication 1.
tokens (passwords).

-L Option: The -L option is used to lock the password of the specified user account, 2.
effectively disabling the password without deleting the user account itself.

Security Measure: Disabling passwords ensures that the user cannot authenticate 3.
using a password, thereby enhancing the security of the instance.


Reference:

1. AWS Documentation: Securing Access to Amazon EC2 Instances

2. Linux man-pages: passwd(1)



An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool's high availability settings must be checked for this?

  1. MySQL Database
  2. Always on Availability Groups (AGs)
  3. SQL Server Database Mirroring (DBM)
  4. Google Cloud SQL

Answer(s): D

Explanation:

For an organization with resources on Google Cloud that needs to ensure high availability and reduce downtime, the high availability settings of Google Cloud SQL should be checked.

Here's the detailed explanation:

Google Cloud SQL Overview: Cloud SQL is a fully-managed relational database 1.
service for MySQL, PostgreSQL, and SQL Server. It provides high availability configurations and automated backups.

High Availability Configuration: Cloud SQL offers high availability through regional 2.
instances, which replicate data across multiple zones within a region to ensure redundancy.

Testing Backups: Regularly testing backups and their configurations ensures that 3.
the high availability settings are functioning correctly and that data recovery is possible in case of an outage.


Reference:

1. Google Cloud SQL Documentation

2. High Availability and Disaster Recovery for Cloud SQL



Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?

  1. It locks down the inbound traffic from myprodvm by creating a rule in the network security group
  2. It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
  3. It locks down the outbound traffic from myprodvm by creating a rule in the network security group
  4. It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall

Answer(s): B

Explanation:

When Shannon Elizabeth enables Just-In-Time (JIT) VM access on the myprodvm virtual machine from the Azure Security Center dashboard, the following happens:

Inbound Traffic Control: JIT VM access locks down the inbound traffic to the virtual 1.
machine.

Azure Firewall Rule: It creates a rule in the Azure firewall to control this inbound 2.
traffic, allowing access only when required and for a specified duration.

Enhanced Security: This approach minimizes exposure to potential attacks by 3.
reducing the time that the VM ports are open.


Reference:

1. Azure Security Center Documentation: Just-In-Time VM Access

2. Microsoft Learn: Configure Just-In-Time VM Access in Azure



William O'Neil works as a cloud security engineer in an IT company located in Tampa, Florid

  1. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access.
    Which of the following commands should William try to create a new user access key ID and secret key for a user?
  2. aws iam target_user -user-name create-access-key
  3. aws iam create-access-key -user-name target_user
  4. aws iam create-access-key target_user -user-name
  5. aws iam -user-name target_user create-access-key

Answer(s): B



Viewing Page 2 of 26



Share your comments for EC-Council 312-40 exam with other users:

A\MAM 6/27/2023 5:17:00 PM

q-6 ans-b correct. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/commit-configuration-changes
UNITED STATES


unanimous 12/15/2023 6:38:00 AM

very nice very nice
Anonymous


akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA