Certified Cloud Security Engineer v1.0

Page:    1 / 9   
Exam contains 125 questions

For securing data, an AWS customer created a key in the Alabama region to encrypt their data in the California region. Two users were added to the key along with an external AWS account. When the AWS customer attempted to encrypt an S3 object, they observed that the key is not listed. What is the reason behind this?

  • A. It takes time for new keys to be listed
  • B. Encryption key should be in the same region
  • C. S3 cannot be integrated with KMS
  • D. AWS does not support external AWS accounts


Answer : B

Veronica Lauren has an experience of 4 years as a cloud security engineer. Recently, she joined an IT company as a senior cloud security engineer. In 2010, her organization became a victim of a cybersecurity attack in which the attacker breached her organization’s cloud security perimeter and stole sensitive information. Since then, her organization started using Google cloud-based services and migrated the organizational workload and data in the Google cloud environment. Veronica would like to detect security breaches in her organization’s cloud security perimeter. Which of the following built-in service of Google Security Command Center can help Veronica in monitoring her organization’s cloud logging stream and collect logs from one or multiple projects to detect security breaches such as the presence of malware, brute force SSH attempts, and cryptomining?

  • A. Web Security Scanner
  • B. Container Threat Detection
  • C. Security Health Analytics
  • D. Event Threat Detection


Answer : D

Curtis Morgan works as a cloud security engineer in an MNC. His organization uses Microsoft Azure for office-site backup of large files, disaster recovery, and business-critical applications that receive significant traffic, etc. Which of the following allows Curtis to establish a fast and secure private connection between multiple on-premises or shared infrastructures with Azure virtual private network?

  • A. Azure Front Door
  • B. Point-to-Site VPN
  • C. Site-to-Site VPN
  • D. Express Route


Answer : D

SecureSoft Solutions Pvt. Ltd. is an IT company that develops mobile-based applications. Owing to the secure and cost-effective cloud-based services provided by Google, the organization migrated its applications and data from on-premises environment to Google cloud. Sienna Miller, a cloud security engineer, selected the Coldline Storage class for storing data in the Google cloud storage bucket. What is the minimum storage duration for Coldline Storage?

  • A. 60 days
  • B. 120 days
  • C. 30 days
  • D. 90 days


Answer : A

Rick Warren has been working as a cloud security engineer in an IT company for the past 4 years. Owing to the robust security features and various cost-effective services offered by AWS, in 2010, his organization migrated to the AWS cloud environment. While inspecting the intrusion detection system, Rick detected a security incident. Which of the following AWS services collects logs from various data sources and stores them on a centralized location as logs files that can be used during forensic investigation in the event of a security incident?

  • A. AWS CloudFormation
  • B. Amazon CloudTrail
  • C. Amazon CloudWatch
  • D. Amazon CloudFront


Answer : B

FinTech Inc. is an IT company that utilizes a cloud platform to run its IT infrastructure. Employees belonging to various departments do not implement the rules and regulations framed by the IT department, which leads to fragmented control and breaches that affect the efficiency of cloud services. How can the organization effectively overcome shadow IT and unwarranted usage of cloud resources in this scenario?

  • A. By implementing cloud governance
  • B. By implementing cloud risk management
  • C. By implementing corporate compliance
  • D. By implementing regulatory compliance


Answer : A

A multinational company decided to shift its organizational infrastructure and data to the cloud. Their team finalized the service provider. Which of the following is a contract that can define the security standards agreed upon by the service provider to maintain the security of the organizational data and infrastructure and define organizational data compliance?

  • A. Service Level Agreement
  • B. Compliance Agreement
  • C. Service Level Contract
  • D. Service Agreement


Answer : A

TeratInfo Pvt. Ltd. is an IT company that develops software products and applications for financial organizations. Owing to the cost-effective storage features and robust services provided by cloud computing, TeratInfo Pvt. Ltd. adopted cloud-based services. Recently, its security team observed a dip in the organizational system performance. Susan, a cloud security engineer, reviewed the list of publicly accessible resources, security groups, routing tables, ACLs, subnets, and IAM policies. What is this process called?

  • A. Checking for the right implementation of security management
  • B. Checking audit and evidence-gathering features in the cloud service
  • C. Testing for virtualization management security
  • D. Performing cloud reconnaissance


Answer : D

Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disaster recovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss. Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel’s organization?

  • A. Hot Site
  • B. Cold Site
  • C. Remote site
  • D. Warm Site


Answer : D

A company is a third-party vendor for several organizations and provides them customized software and products to cater to their needs. It recently moved its infrastructure and applications on cloud. Its applications are not working on the cloud as expected. The developers and testers are experiencing significant difficulty in managing and deploying the code in the cloud. Which of the following will help them with automated integration, development, testing, and deployment in the cloud?

  • A. Dashboard
  • B. DevOps
  • C. Vulnerability assessment tool
  • D. SIEM


Answer : B

Georgia Lyman works as a cloud security engineer in a multinational company. Her organization uses cloud-based services. Its virtualized networks and associated virtualized resources encountered certain capacity limitations that affected the data transfer performance and virtual server communication. How can Georgia eliminate the data transfer capacity thresholds imposed on a virtual server by its virtualized environment?

  • A. By restricting the virtual server to bypass the hypervisor and access the I/O card of the physical server directly
  • B. By allowing the virtual appliance to bypass the hypervisor and access the I/O card of the physical server directly
  • C. By allowing the virtual server to bypass the hypervisor and access the I/O card of the physical server directly
  • D. By restricting the virtual appliance to bypass the hypervisor and access the I/O card of the physical server directly


Answer : C

SecAppSol Pvt. Ltd. is a cloud software and application development company located in Louisville, Kentucky. The security features provided by its previous cloud service provider was not satisfactory, and in 2012, the organization became a victim of eavesdropping. Therefore, SecAppSol Pvt. Ltd. changed its cloud service provider and adopted AWS cloud-based services owing to its robust and cost-effective security features. How does SecAppSol Pvt. Ltd.’s security team encrypt the traffic between the load balancer and client that initiate SSL or TLS sessions?

  • A. By enabling RADIUS Authentication
  • B. By enabling Cloud Identity Aware Proxy
  • C. By enabling HTTPS listener
  • D. By enabling Amazon GuardDuty


Answer : C

Rachel McAdams works as a senior cloud security engineer in a cloud service provider company. Owing to the robust services and security features provided by her organization, the number of cloud consumers continues to increase. To meet the increasing cloud consumer requirements, her organization decided to build more data centers. Therefore, Rachel’s organization formed a new team to design and construct data centers. Rachel is also part of the team and was given the responsibility of designing the data center. How can Racheal maintain a stable temperature in the HVAC unit?

  • A. Rachel can design HVAC such that the heat generated by the data center equipment is taken outside and cool air to supply the equipment is taken inside.
  • B. Rachel can design HVAC such that the cool air and heat generated by data center equipment should remain inside to stabilize the temperature.
  • C. Rachel can design HVAC such that the heat generated by the data center equipment is taken inside and cool air to supply the equipment is taken outside.
  • D. Rachel can design HVAC such that the cool air and heat generated by data center equipment should remain outside to stabilize the temperature.


Answer : A

Jack Jensen works as a cloud security engineer in an IT company located in Madison, Wisconsin. Owing to the various security services provided by Google, in 2012, his organization adopted Google cloud-based services. Jack would like to identify security abnormalities to secure his organizational data and workload. Which of the following is a built-in feature in the Security Command Center that utilizes behavioral signals to detect security abnormalities such as unusual activity and leaked credentials in virtual machines or GCP projects?

  • A. Cloud Anomaly Detection
  • B. Cloud Armor
  • C. Security Health Analytics
  • D. Anomaly Detector


Answer : A

Jordon Bridges works as a cloud security engineer in a multinational company. His organization uses Google cloud-based services (GC) because Google cloud provides robust security services, better pricing than competitors, improved performance, and redundant backup. Using IAM security configuration, Jordon implemented the principle of least privilege. A GC IAM member could be a Google account, service account, Google group, G Suite, or cloud identity domain with an identity to access Google cloud resources. Which of the following identities is used by GC IAM members to access Google cloud resources?

  • A. For Google Account, Google group, and service account, the identity used is an email address, whereas in G Suite and cloud identity domain, the identity used is the domain name.
  • B. For Google Account, Google group, and G suite, the identity used is an email address, whereas in service account and cloud identity domain, the identity used is the domain name.
  • C. For Google Account, Google group, and G suite, the identity used is the domain name, whereas in service account and cloud identity domain, the identity used is an email address.
  • D. For Google Account, Google group, and service account, the identity used is the domain name, whereas in G Suite and cloud identity domain, the identity used is an email address.


Answer : A

Page:    1 / 9   
Exam contains 125 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy