Free 312-40 Exam Braindumps (page: 3)

Page 2 of 33

Brentech Services allows its clients to access (read, write, or delete) Google Cloud Storage resources for a limited time without a Google account while it controls access to Cloud Storage. How does the organization accomplish this?

  1. Using BigQuery column-level security
  2. Using Signed Documents
  3. Using Signed URLs
  4. Using BigQuery row-level-security

Answer(s): C



Daffod is an American cloud service provider that provides cloud-based services to customers worldwide.

Several customers are adopting the cloud services provided by Daffod because they are secure and cost-

effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the economic and national security interests of the US. Based on the given information, which law order does Daffod adhere to?

  1. FERPA
  2. CLOUD
  3. FISMA
  4. ECPA

Answer(s): C

Explanation:

Daffod, as an American cloud service provider complying with the cloud computing law that emphasizes the importance of information security for economic and national security interests, adheres to the Federal Information Security Management Act (FISMA). Here's why:

FISMA Overview: FISMA is a US law enacted to protect government information, 1.
operations, and assets against natural or man-made threats.

Importance of Information Security: FISMA requires that all federal agencies 2.

develop, document, and implement an information security and protection program.

Relevance to Daffod: As Daffod complies with this law, it ensures that its cloud 3.
services are secure and adhere to national security standards, making it a trusted provider for secure and cost-effective cloud services.


Reference:

1. NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations

2. Federal Information Security Modernization Act (FISMA)



Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud- based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI.
Which of the following command should Simon run in the EC2 instance to disable user account passwords?

  1. passwd -D < USERNAME >
  2. passwd -I < USERNAME >
  3. passwd -d < USERNAME >
  4. passwd -L < USERNAME >

Answer(s): D

Explanation:

To disable user account passwords on an Amazon EC2 Linux instance, Simon should use the command passwd -L <USERNAME>. Here's the detailed explanation:

passwd Command: The passwd command is used to update a user's authentication 1.
tokens (passwords).

-L Option: The -L option is used to lock the password of the specified user account, 2.
effectively disabling the password without deleting the user account itself.

Security Measure: Disabling passwords ensures that the user cannot authenticate 3.
using a password, thereby enhancing the security of the instance.


Reference:

1. AWS Documentation: Securing Access to Amazon EC2 Instances

2. Linux man-pages: passwd(1)



An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool's high availability settings must be checked for this?

  1. MySQL Database
  2. Always on Availability Groups (AGs)
  3. SQL Server Database Mirroring (DBM)
  4. Google Cloud SQL

Answer(s): D

Explanation:

For an organization with resources on Google Cloud that needs to ensure high availability and reduce downtime, the high availability settings of Google Cloud SQL should be checked.

Here's the detailed explanation:

Google Cloud SQL Overview: Cloud SQL is a fully-managed relational database 1.
service for MySQL, PostgreSQL, and SQL Server. It provides high availability configurations and automated backups.

High Availability Configuration: Cloud SQL offers high availability through regional 2.
instances, which replicate data across multiple zones within a region to ensure redundancy.

Testing Backups: Regularly testing backups and their configurations ensures that 3.
the high availability settings are functioning correctly and that data recovery is possible in case of an outage.


Reference:

1. Google Cloud SQL Documentation

2. High Availability and Disaster Recovery for Cloud SQL






Post your Comments and Discuss EC-Council 312-40 exam with other Community members:

312-40 Discussions & Posts