Free 312-40 Exam Braindumps (page: 4)

Page 3 of 33

Shannon Elizabeth works as a cloud security engineer in VicPro Soft Pvt. Ltd. Microsoft Azure provides all cloud-based services to her organization. Shannon created a resource group (ProdRes), and then created a virtual machine (myprodvm) in the resource group. On myprodvm virtual machine, she enabled JIT from the Azure Security Center dashboard.
What will happen when Shannon enables JIT VM access?

  1. It locks down the inbound traffic from myprodvm by creating a rule in the network security group
  2. It locks down the inbound traffic to myprodvm by creating a rule in the Azure firewall
  3. It locks down the outbound traffic from myprodvm by creating a rule in the network security group
  4. It locks down the outbound traffic to myprodvm by creating a rule in the Azure firewall

Answer(s): B

Explanation:

When Shannon Elizabeth enables Just-In-Time (JIT) VM access on the myprodvm virtual machine from the Azure Security Center dashboard, the following happens:

Inbound Traffic Control: JIT VM access locks down the inbound traffic to the virtual 1.
machine.

Azure Firewall Rule: It creates a rule in the Azure firewall to control this inbound 2.
traffic, allowing access only when required and for a specified duration.

Enhanced Security: This approach minimizes exposure to potential attacks by 3.
reducing the time that the VM ports are open.


Reference:

1. Azure Security Center Documentation: Just-In-Time VM Access

2. Microsoft Learn: Configure Just-In-Time VM Access in Azure



William O'Neil works as a cloud security engineer in an IT company located in Tampa, Florid

  1. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access.
    Which of the following commands should William try to create a new user access key ID and secret key for a user?
  2. aws iam target_user -user-name create-access-key
  3. aws iam create-access-key -user-name target_user
  4. aws iam create-access-key target_user -user-name
  5. aws iam -user-name target_user create-access-key

Answer(s): B



Colin Farrell works as a senior cloud security engineer in a healthcare company. His organization has migrated all workloads and data in a private cloud environment. An attacker used the cloud environment as a point to disrupt the business of Colin's organization. Using intrusion detection prevention systems, antivirus software, and log analyzers, Colin successfully detected the incident; however, a group of users were not able to avail the critical services provided by his organization. Based on the incident impact level classification scales, select the severity of the incident encountered by Colin's organization?

  1. High
  2. None
  3. Low
  4. Medium

Answer(s): A



Sam, a cloud admin, works for a technology company that uses Azure resources. Because Azure contains the resources of numerous organizations and several alerts are received timely, it is difficult for the technology company to identify risky resources, determine their owner, know whether they are needed, and know who pays for them. How can Sam organize resources to determine this information immediately?

  1. By using tags
  2. By setting up Azure Front Door
  3. By configuring workflow automation
  4. By using ASC Data Connector

Answer(s): A






Post your Comments and Discuss EC-Council 312-40 exam with other Community members:

312-40 Discussions & Posts