Q: 11
Simon recently joined a multinational company as a cloud security engineer. Due to robust security
services and products provided by AWS, his organization has been using AWS cloud-based services.
Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure
Linux AMI. Which of the following command should Simon run in the EC2 instance to disable user
account passwords?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
AWS runs 35+ instances that are all CentOS machines. Updating these machines manually is a time-
intensive task that may lead to missed updates for some instances and create vulnerabilities. Which
of the following can be used to prevent each port of each instance from being opened to access the
machine and install updates?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Jack Jensen works as a cloud security engineer in an IT company located in Madison, Wisconsin.
Owing to the various security services provided by Google, in 2012, his organization adopted Google
cloud-based services. Jack would like to identify security abnormalities to secure his organizational
data and workload. Which of the following is a built-in feature in the Security Command Center that
utilizes behavioral signals to detect security abnormalities such as unusual activity and leaked
credentials in virtual machines or GCP projects?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
An IT company uses two resource groups, named Production-group and Security-group, under the
same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be
compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk
of the suspect virtual machine Ubuntu18 for further investigation and copy the snapshot to a storage
account under Security-group.
Identify the next step in the investigation of the security incident in Azure?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
SecureSoft Solutions Pvt. Ltd. is an IT company that develops mobile-based applications. Owing to
the secure and cost-effective cloud-based services provided by Google, the organization migrated its
applications and data from on premises environment to Google cloud. Sienna Miller, a cloud security
engineer, selected the Coldlinc Storage class for storing data in the Google cloud storage bucket.
What is the minimum storage duration for Coldline Storage?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Elaine Grey has been working as a senior cloud security engineer in an IT company that develops
software and applications related to the financial sector. Her organization would like to extend its
storage capacity and automate disaster recovery workflows using a VMware private cloud. Which of
the following storage options can be used by Elaine in the VMware virtualization environment to
connect a VM directly to a LUN and access it from SAN?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Tom Holland works as a cloud security engineer in an IT company located in Lansing, Michigan. His
organization has adopted cloud-based services wherein user access, application, and data security
are the responsibilities of the organization, and the OS, hypervisor, physical, infrastructure, and
network security are the responsibilities of the cloud service provider. Based on the aforementioned
cloud security shared responsibilities, which of the following cloud computing service models is
enforced in Tom's organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
A cloud organization, AZS, wants to maintain homogeneity in its cloud operations because the CPU
speed measured by AZS varies and the measurement units lack consistency in the standards. For
example, AWS defines the CPU speed with Elastic Compute Unit, Google with Google Compute
Engine Unit, and Microsoft with clock speed. Here, which cloud computing standard can leverage
frameworks and architectures specific to the cloud for maintaining homogeneity in operations?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Kelsey Lewis has been working as a cloud security engineer in a BPO company that provides 24-7
customer service. Owing to the cost-effective storage and security features provided by cloud
computing, her organization adopted the cloud environment 4 years ago. Kelsey implemented the
TLS protocol to provide security to e-mail communications, voice over IP (VoIP) communication, web
traffic, messaging clients, file transfers, and internet services [Domain Name Service (DNS) and
Network Time Protocol (NTP)). Which certificate is used by TLS for communication authentication
and encryption between hosts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
Ray Nicholson works as a senior cloud security engineer in TerraCloud Sec Pvt. Ltd. His organization
deployed all applications in a cloud environment in various virtual machines. Using IDS, Ray
identified that an attacker compromised a particular VM. He would like to limit the scope of the
incident and protect other resources in the cloud. If Ray turns off the VM, what will happen?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2