EC-Council 312-40 Exam Questions
Certified Cloud Security Engineer (CCSE) (Page 3 )

Updated On: 24-Feb-2026

Daffod is an American cloud service provider that provides cloud-based services to customers worldwide.
Several customers are adopting the cloud services provided by Daffod because they are secure and cost-
effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the economic and national security interests of the US. Based on the given information, which law order does Daffod adhere to?

  1. FERPA
  2. CLOUD
  3. FISMA
  4. ECPA

Answer(s): C

Explanation:

Daffod, as an American cloud service provider complying with the cloud computing law that emphasizes the importance of information security for economic and national security interests, adheres to the Federal Information Security Management Act (FISMA). Here's why:
FISMA Overview: FISMA is a US law enacted to protect government information, operations, and assets against natural or man-made threats.
Importance of Information Security: FISMA requires that all federal agencies develop, document, and implement an information security and protection program. Relevance to Daffod: As Daffod complies with this law, it ensures that its cloud services are secure and adhere to national security standards, making it a trusted provider for secure and cost-effective cloud services.


Reference:

NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations Federal Information Security Modernization Act (FISMA)



Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI.
Which of the following command should Simon run in the EC2 instance to disable user account passwords?

  1. passwd -D < USERNAME >
  2. passwd -I < USERNAME >
  3. passwd -d < USERNAME >
  4. passwd -L < USERNAME >

Answer(s): B

Explanation:

To disable user account passwords on an Amazon EC2 Linux instance, Simon should use the command passwd -L <USERNAME>. Here's the detailed explanation:
passwd Command: The passwd command is used to update a user's authentication tokens (passwords).
-L Option: The -L option is used to lock the password of the specified user account, effectively disabling the password without deleting the user account itself. Security Measure: Disabling passwords ensures that the user cannot authenticate using a password, thereby enhancing the security of the instance.


Reference:

AWS Documentation: Securing Access to Amazon EC2 Instances Linux man-pages: passwd(1)



An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups are configured.
Which tool's high availability settings must be checked for this?

  1. MySQL Database
  2. Always on Availability Groups (AGs)
  3. SQL Server Database Mirroring (DBM)
  4. Google Cloud SQL

Answer(s): D

Explanation:

For an organization with resources on Google Cloud that needs to ensure high availability and reduce downtime, the high availability settings of Google Cloud SQL should be checked. Here's the detailed explanation:
Google Cloud SQL Overview: Cloud SQL is a fully-managed relational database service for MySQL, PostgreSQL, and SQL Server. It provides high availability configurations and automated backups. High Availability Configuration: Cloud SQL offers high availability through regional instances, which replicate data across multiple zones within a region to ensure redundancy. Testing Backups: Regularly testing backups and their configurations ensures that the high availability settings are functioning correctly and that data recovery is possible in case of an outage.


Reference:

Google Cloud SQL Documentation
High Availability and Disaster Recovery for Cloud SQL



Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?

  1. It locks down the inbound traffic from myprodvm by creating a rule in the network security group
  2. It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
  3. It locks down the outbound traffic from myprodvm by creating a rule in the network security group
  4. It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall

Answer(s): B

Explanation:

When Shannon Elizabeth enables Just-In-Time (JIT) VM access on the myprodvm virtual machine from the Azure Security Center dashboard, the following happens:
Inbound Traffic Control: JIT VM access locks down the inbound traffic to the virtual machine. Azure Firewall Rule: It creates a rule in the Azure firewall to control this inbound traffic, allowing access only when required and for a specified duration. Enhanced Security: This approach minimizes exposure to potential attacks by reducing the time that the VM ports are open.


Reference:

Azure Security Center Documentation: Just-In-Time VM Access Microsoft Learn: Configure Just-In-Time VM Access in Azure



William O'Neil works as a cloud security engineer in an IT company located in Tampa, Florid

  1. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access.
    Which of the following commands should William try to create a new user access key ID and secret key for a user?
  2. aws iam target_user -user-name create-access-key
  3. aws iam create-access-key -user-name target_user
  4. aws iam create-access-key target_user -user-name
  5. aws iam -user-name target_user create-access-key

Answer(s): A






Post your Comments and Discuss EC-Council 312-40 exam dumps with other Community members:

Join the 312-40 Discussion