Eccouncil Certified Cloud Security Engineer (CCSE) 312-40 Exam Practice Test

Page: 1 / 14
Total 147 questions
Question 1

Stephen Cyrus has been working as a cloud security engineer in an MNC over the past 7 years. The database administration team requested Stephen to configure a server instance that can enhance the performance of their new database server running on Compute Engine. The database is built on MySQL running on Debian Linux and it is used to import and normalize the company's performance statistics. They have an n2-standard-8 virtual machine with 80 GB of SSD zonal persistent disk, which cannot be restarted until the next maintenance event. Which of the following can help Stephen to enhance the performance of this VM quickly and in a cost-effective manner?



Answer : A

To enhance the performance of a MySQL database running on Compute Engine quickly and in a cost-effective manner, Stephen can dynamically resize the SSD persistent disk to 500 GB. Here's why this option is effective:

Increased IOPS and Throughput: SSDs provide higher input/output operations per second (IOPS) and throughput compared to traditional hard drives. By increasing the size of the SSD persistent disk, Stephen can benefit from increased IOPS and throughput, which are crucial for database performance, especially when dealing with large volumes of data imports and normalization processes1.

No Downtime Required: Dynamically resizing the SSD persistent disk can be done without stopping the virtual machine, which aligns with the requirement that the VM cannot be restarted until the next maintenance event1.

Cost-Effectiveness: Resizing the disk is a cost-effective solution because it does not require provisioning additional compute resources or migrating to a different database service, which could incur higher costs and complexity1.

Immediate Performance Boost: The performance improvement is immediate after the disk resize, as the database can utilize the additional space for better disk I/O performance, which is often a bottleneck in database operations1.


LogRocket Blog: 5 ways to rapidly improve MySQL database performance1.

Google Cloud Documentation: Architectures for high availability of MySQL clusters on Compute Engine2.

Percona Blog: MySQL Performance Tuning 101: Key Tips to Improve MySQL Database Performance3.

Question 2

An organization wants to securely connect to the AWS environment with a speed of 20 Gbps directly through its data centers, branch offices, and colocation facilities to ensure that its customers can securely access public (objects stored in Amazon S3) and private (limited access features such as VPC) resources by bypassing the internet service providers in the path. Which of the following AWS services can be helpful for the organization?



Answer : C


Question 3

An organization, PARADIGM PlayStation, moved its infrastructure to a cloud as a security practice. It established an incident response team to monitor the hosted websites for security issues. While examining network access logs using SIEM, the incident response team came across some incidents that suggested that one of their websites was targeted by attackers and they successfully performed an SQL injection attack.

Subsequently, the incident response team made the website and database server offline. In which of the

following steps of the incident response lifecycle, the incident team determined to make that decision?



Answer : B

The decision to take the website and database server offline falls under the Containment phase of the incident response lifecycle. Here's how the process typically unfolds:

Detection: The incident response team detects a potential security breach, such as an SQL injection attack, through network access logs using SIEM.

Analysis: The team analyzes the incident to confirm the breach and understand its scope and impact.

Containment: Once confirmed, the team moves to contain the incident to prevent further damage. This includes making the affected website and database server offline to stop the attack from spreading or causing more harm1.

Eradication and Recovery: After containment, the team works on eradicating the threat and recovering the systems to normal operation.

Post-Incident Activity: Finally, the team conducts a post-mortem analysis to learn from the incident and improve future response efforts.

Reference: The containment phase is critical in incident response as it aims to limit the damage of the security incident and isolate affected systems to prevent the spread of the attack12. Taking systems offline is a common containment strategy to ensure that attackers can no longer access the compromised systems1.


Question 4

Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI. Which of the following command should Simon run in the EC2 instance to disable user account passwords?



Answer : B

To disable user account passwords on an Amazon EC2 Linux instance, Simon should use the command passwd -L <USERNAME>. Here's the detailed explanation:

passwd Command: The passwd command is used to update a user's authentication tokens (passwords).

-L Option: The -L option is used to lock the password of the specified user account, effectively disabling the password without deleting the user account itself.

Security Measure: Disabling passwords ensures that the user cannot authenticate using a password, thereby enhancing the security of the instance.


AWS Documentation: Securing Access to Amazon EC2 Instances

Linux man-pages: passwd(1)

Question 5

Elaine Grey has been working as a senior cloud security engineer in an IT company that develops software and applications related to the financial sector. Her organization would like to extend its storage capacity and automate disaster recovery workflows using a VMware private cloud. Which of the following storage options can be used by Elaine in the VMware virtualization environment to connect a VM directly to a LUN and access it from SAN?



Question 6

Alice, a cloud forensic investigator, has located, a relevant evidence during his investigation of a security breach in an organization's Azure environment. As an investigator, he needs to sync different types of logs generated by Azure resources with Azure services for better monitoring. Which Azure logging and auditing feature can enable Alice to record information on the Azure subscription layer and obtain the evidence (information related to the operations performed on a specific resource, timestamp, status of the operation, and the user responsible for it)?



Answer : C

Azure Activity Logs provide a record of operations performed on resources within an Azure subscription. They are essential for monitoring and auditing purposes, as they offer detailed information on the operations, including the timestamp, status, and the identity of the user responsible for the operation.

Here's how Azure Activity Logs can be utilized by Alice:

Recording Operations: Azure Activity Logs record all control-plane activities, such as creating, updating, and deleting resources through Azure Resource Manager.

Evidence Collection: For forensic purposes, these logs are crucial as they provide evidence of the operations performed on specific resources.

Syncing Logs: Azure Activity Logs can be integrated with Azure services for better monitoring and can be synced with other tools for analysis.

Access and Management: Investigators like Alice can access these logs through the Azure portal, Azure CLI, or Azure Monitor REST API.

Security and Compliance: These logs are also used for security and compliance, helping organizations to meet regulatory requirements.


Microsoft Learn documentation on Azure security logging and auditing, which includes details on Azure Activity Logs1.

Azure Monitor documentation, which provides an overview of the monitoring solutions and mentions the use of Azure Activity Logs2.

Question 7

A document has an organization's classified information. The organization's Azure cloud administrator has to send it to different recipients. If the email is not protected, this can be opened and read by any user. So the document should be protected and it will only be opened by authorized users. In this scenario, which Azure service can enable the admin to share documents securely?



Answer : A

Azure Information Protection (AIP) is a cloud-based solution that helps organizations classify and protect documents and emails by applying labels. AIP can be used to protect both data at rest and in transit, making it suitable for securely sharing classified information.

Here's how AIP secures document sharing:

Classification and Labeling: AIP allows administrators to classify data based on sensitivity and apply labels that carry protection settings.

Protection: It uses encryption, identity, and authorization policies to protect documents and emails.

Access Control: Only authorized users with the right permissions can access protected documents, even if the document is shared outside the organization.

Tracking and Revocation: Administrators can track activities on shared documents and revoke access if necessary.

Integration: AIP integrates with other Microsoft services and applications, ensuring a seamless protection experience across the organization's data ecosystem.


Microsoft's overview of Azure Information Protection, which details how it helps secure document sharing1.

A guide on how to configure and use Azure Information Protection for protecting sensitive information2.

Page:    1 / 14   
Total 147 questions