EC-Council 312-40 Exam (page: 5)
EC-Council Certified Cloud Security Engineer (CCSE)
Updated on: 31-Mar-2026

Viewing Page 5 of 26

Trevor Noah works as a cloud security engineer in an IT company located in Seattle, Washington. Trevor has implemented a disaster recovery approach that runs a scaled-down version of a fully functional environment in the cloud. This method is most suitable for his organization's core business-critical functions and solutions that require the RTO and RPO to be within minutes. Based on the given information, which of the following disaster recovery approach is implemented by Trevor?

  1. Backup and Restore
  2. Multi-Cloud Option
  3. Pilot Light approach
  4. Warm Standby

Answer(s): D

Explanation:

The Warm Standby approach in disaster recovery involves running a scaled-down version of a fully functional environment in the cloud. This method is activated quickly in case of a disaster, ensuring that the Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are within minutes.
1. Scaled-Down Environment: A smaller version of the production environment is always running in the cloud. This includes a minimal number of resources required to keep the application operational12.

2. Quick Activation: In the event of a disaster, the warm standby environment can be quickly scaled up to handle the full production load12.

3. RTO and RPO: The warm standby approach is designed to achieve an RTO and RPO within minutes, which is essential for business-critical functions12.

4. Business Continuity: This approach ensures that core business functions continue to operate with minimal disruption during and after a disaster12.


Reference:

Warm Standby is a disaster recovery strategy that provides a balance between cost and downtime. It is less expensive than a fully replicated environment but offers a faster recovery time than cold or pilot light approaches12. This makes it suitable for organizations that need to ensure high availability and quick recovery for their critical systems.



You are the manager of a cloud-based security platform that offers critical services to government agencies and private companies. One morning, your team receives an alert from the platform's intrusion detection system indicating that there has been a potential breach in the system. As the manager, which tool you will use for viewing and monitoring the sensitive data by scanning storage systems and reviewing the access rights to critical resources via a single centralized dashboard?

  1. Google Cloud Security Command Center
  2. Google Cloud Security Scanner
  3. Cloud Identity and Access Management (IAM)
  4. Google Cloud Armor

Answer(s): A

Explanation:

The Google Cloud Security Command Center (Cloud SCC) is the tool designed to provide a centralized dashboard for viewing and monitoring sensitive data, scanning storage systems, and reviewing access rights to critical resources.

1. Centralized Dashboard: Cloud SCC offers a comprehensive view of the security status of your resources in Google Cloud, across all your projects and services1.

2. Sensitive Data Scanning: It has capabilities for scanning storage systems to identify sensitive data, such as personally identifiable information (PII), and can provide insights into where this data is stored1.

3. Access Rights Review: Cloud SCC allows you to review who has access to your critical resources and whether any policies or permissions should be adjusted to enhance security1.

4. Alerts and Incident Response: In the event of a potential breach, Cloud SCC can help identify the affected resources and assist in the investigation and response process1.


Reference:

Google Cloud Security Command Center is a security management and data risk platform for Google Cloud that helps you prevent, detect, and respond to threats from a single pane of glass. It provides security insights and features like asset inventory, discovery, search, and management; vulnerability and threat detection; and compliance monitoring to protect your services and applications on Google Cloud1.



An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues.
While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.

Subsequently, the incident response team made the website and database server offline. In which of the following steps of the incident response lifecycle, the incident team determined to make that decision?

  1. Analysis
  2. Containment
  3. Coordination and information sharing
  4. Post-mortem

Answer(s): B

Explanation:

The decision to take the website and database server offline falls under the Containment phase of the incident response lifecycle. Here's how the process typically unfolds:
1. Detection: The incident response team detects a potential security breach, such as an SQL injection attack, through network access logs using SIEM.

2. Analysis: The team analyzes the incident to confirm the breach and understand its scope and impact.

3. Containment: Once confirmed, the team moves to contain the incident to prevent further damage. This includes making the affected website and database server offline to stop the attack from spreading or causing more harm1.

4. Eradication and Recovery: After containment, the team works on eradicating the threat and recovering the systems to normal operation.

5. Post-Incident Activity: Finally, the team conducts a post-mortem analysis to learn from the incident and improve future response efforts.


Reference:

The containment phase is critical in incident response as it aims to limit the damage of the security incident and isolate affected systems to prevent the spread of the attack12. Taking systems offline is a common containment strategy to ensure that attackers can no longer access the compromised systems1.



Global SciTech Pvt. Ltd. is an IT company that develops healthcare-related software. Using an incident detection system (IDS) and antivirus software, the incident response team of the organization has observed that attackers are targeting the organizational network to gain access to the resources in the on-premises environment. Therefore, their team of cloud security engineers met with a cloud service provider to discuss the various security provisions offered by the cloud service provider.
While discussing the security of the organization's virtual machine in the cloud environment, the cloud service provider stated that the Network Security Groups (NSGs) will secure the VM by allowing or denying network traffic to VM instances in a virtual network based on inbound and outbound security rules.
Which of the following cloud service provider filters the VM network traffic in a virtual network using NSGs?

  1. IBM
  2. AWS
  3. Azure
  4. Google

Answer(s): C

Explanation:

Network Security Groups (NSGs) are used in Azure to filter network traffic to and from Azure resources within an Azure Virtual Network (VNet). NSGs contain security rules that allow or deny inbound and outbound network traffic based on several parameters such as protocol, source and destination IP address, port number, and direction (inbound or outbound).

1. NSG Functionality: NSGs function as a firewall for VM instances, controlling both inbound and outbound traffic at the network interface, VM, and subnet level1.

2. Security Rules: They consist of security rules that specify source and destination, port, and protocol to filter traffic1.

3. Traffic Control: By setting appropriate rules, NSGs help secure VMs from unauthorized access and ensure that only allowed traffic can flow to and from the VM1.

4. Azure Specific: This feature is specific to Azure and is not offered by IBM, AWS, or Google

Cloud in the same manner1.


Reference:

NSGs are a key component of Azure's networking capabilities, providing a way to control access to VMs, services, and subnets, and are an integral part of Azure's security infrastructure1.



TetraSoft Pvt. Ltd. is an IT company that provides software and application services to numerous customers across the globe. In 2015, the organization migrated its applications and data from on-premises to the AWS cloud environment. The cloud security team of TetraSoft Pvt. Ltd. suspected that the EC2 instance that launched the core application of the organization is compromised. Given below are randomly arranged steps involved in the forensic acquisition of an EC2 instance. In this scenario, when should the investigators ensure that a forensic instance is in the terminated state?

  1. After creating evidence volume from the snapshot
  2. Before taking a snapshot of the EC2 instance
  3. Before attaching evidence volume to the forensic instance
  4. After attaching evidence volume to the forensic instance

Answer(s): A



Viewing Page 5 of 26



Share your comments for EC-Council 312-40 exam with other users:

Lucio 10/6/2023 1:45:00 PM

very useful to verify knowledge before exam
POLAND


Ajay 5/17/2023 4:54:00 AM

good stuffs
Anonymous


TestPD1 8/10/2023 12:19:00 PM

question 17 : responses arent b and c ?
EUROPEAN UNION


Nhlanhla 12/13/2023 5:26:00 AM

just passed the exam on my first try using these dumps.
Anonymous


Rizwan 1/6/2024 2:18:00 AM

very helpful
INDIA


Yady 5/24/2023 10:40:00 PM

these questions look good.
SINGAPORE


Kettie 10/12/2023 1:18:00 AM

this is very helpful content
Anonymous


SB 7/21/2023 3:18:00 AM

please provide the dumps
UNITED STATES


David 8/2/2023 8:20:00 AM

it is amazing
Anonymous


User 8/3/2023 3:32:00 AM

quesion 178 about "a banking system that predicts whether a loan will be repaid is an example of the" the answer is classification. not regresion, you should fix it.
EUROPEAN UNION


quen 7/26/2023 10:39:00 AM

please upload apache spark dumps
Anonymous


Erineo 11/2/2023 5:34:00 PM

q14 is b&c to reduce you will switch off mail for every single alert and you will switch on daily digest to get a mail once per day, you might even skip the empty digest mail but i see this as a part of the daily digest adjustment
Anonymous


Paul 10/21/2023 8:25:00 AM

i think it is good question
Anonymous


Unknown 8/15/2023 5:09:00 AM

good for students who wish to give certification.
INDIA


Ch 11/20/2023 10:56:00 PM

is there a google drive link to the images? the links in questions are not working.
AUSTRALIA


Joey 5/16/2023 5:25:00 AM

very promising, looks great, so much wow!
Anonymous


alaska 10/24/2023 5:48:00 AM

i scored 87% on the az-204 exam. thanks! i always trust
GERMANY


nnn 7/9/2023 11:09:00 PM

good need more
Anonymous


User-sfdc 12/29/2023 7:21:00 AM

sample questions seems good
Anonymous


Tamer dam 8/4/2023 10:21:00 AM

huawei is ok
UNITED STATES


YK 12/11/2023 1:10:00 AM

good one nice
JAPAN


de 8/28/2023 2:38:00 AM

please continue
GERMANY


DMZ 6/25/2023 11:56:00 PM

this exam dumps just did the job. i donot want to ruffle your feathers but your exam dumps and mock test engine is amazing.
UNITED KINGDOM


Jose 8/30/2023 6:14:00 AM

nice questions
PORTUGAL


Tar01 7/24/2023 7:07:00 PM

the explanation are really helpful
Anonymous


DaveG 12/15/2023 4:50:00 PM

just passed my exam yesterday on my first attempt. these dumps were extremely helpful in passing first time. the questions were very, very similar to these questions!
Anonymous


A.K. 6/30/2023 6:34:00 AM

cosmos db is paas not saas
Anonymous


S Roychowdhury 6/26/2023 5:27:00 PM

what is the percentage of common questions in gcp exam compared to 197 dump questions? are they 100% matching with real gcp exam?
Anonymous


Bella 7/22/2023 2:05:00 AM

not able to see questions
Anonymous


Scott 9/8/2023 7:19:00 AM

by far one of the best sites for free questions. i have pass 2 exams with the help of this website.
CANADA


donald 8/19/2023 11:05:00 AM

excellent question bank.
Anonymous


Ashwini 8/22/2023 5:13:00 AM

it really helped
Anonymous


sk 5/13/2023 2:07:00 AM

excelent material
INDIA


Christopher 9/5/2022 10:54:00 PM

the new versoin of this exam which i downloaded has all the latest questions from the exam. i only saw 3 new questions in the exam which was not in this dump.
CANADA