ECCouncil  312-40 Exam Dumps & Practice Test Questions

Question 1:

Crucially, the system is designed to prevent data loss by recalculating data from the distributed parity if a drive fails. While a minimum of three disks is required, Lexie utilizes seven for optimal performance.

Considering these details, which RAID level has Lexie configured?

A. RAID 3 

B. RAID 5 

C. RAID 1 

D. RAID 0

Correct Answer: B. RAID 5

Explanation:

To determine the specific RAID level configured by Lexie, we must dissect the key characteristics she implemented and align them with the defining features of various RAID types. RAID, or Redundant Array of Independent Disks, is a vital data storage technology that consolidates multiple physical disk drives into one or more logical units. Its primary objectives are to enhance data redundancy, improve fault tolerance, and boost overall performance. Lexie's setup exhibits several distinct attributes that point directly to a particular RAID level.

Firstly, the description highlights "block-level striping with a distributed parity." Striping is a fundamental RAID concept where data is segmented into chunks and then spread across multiple disks. The "block-level" aspect signifies that data is divided into fixed-size blocks before distribution, which is common in performance-oriented RAID levels. More importantly, the mention of "distributed parity" is a crucial differentiator. In this scheme, the parity data—which is essential for reconstructing lost data in the event of a disk failure—is not confined to a single, dedicated drive. Instead, it is intelligently scattered across all the operational drives within the RAID array. This distribution mechanism is a hallmark of certain advanced RAID configurations, offering superior performance compared to centralized parity.

Secondly, the scenario emphasizes the RAID's ability to "prevent data loss after a drive fails" by recalculating data from the distributed parity. This capability underscores the fault tolerance of Lexie's configuration. When a drive in such an array fails, the remaining drives, along with the distributed parity information, can be used to reconstruct the lost data, ensuring business continuity and data integrity. This level of data protection is a primary reason organizations adopt RAID.

Thirdly, the requirement of "at least three disks" for the configuration, with Lexie utilizing "seven disks for robust performance," is another strong indicator. RAID 5 mandates a minimum of three disks to function, as it needs at least two data drives and one drive for distributed parity to be effective. Using more disks, as Lexie has done with seven, significantly enhances the array's storage capacity and can improve read/write performance by allowing more concurrent I/O operations. The ability to "re-size data chunks" or stripes is also a flexible feature often found in RAID 5 implementations, allowing administrators to optimize the array's performance for specific workloads.

Let's briefly examine why the other options are incorrect:

  • RAID 3: While RAID 3 uses striping and parity, it employs byte-level striping and, crucially, a dedicated parity disk. This means all parity information resides on a single drive, creating a bottleneck during writes and making it less efficient for random I/O operations compared to distributed parity. This clearly contradicts Lexie's distributed parity setup.

  • RAID 1: Known as mirroring, RAID 1 duplicates data entirely across two or more drives. It offers excellent fault tolerance but does not involve striping or parity. It is simply a direct copy, making it fundamentally different from Lexie's description of block-level striping with distributed parity.

  • RAID 0: This RAID level focuses solely on performance through striping data across multiple drives without any parity or redundancy. If even one drive in a RAID 0 array fails, all data is lost. The scenario explicitly states that Lexie's configuration prevents data loss after a drive failure, immediately ruling out RAID 0.

Based on the synthesis of these characteristics—block-level striping, distributed parity, fault tolerance against a single drive failure, and a minimum requirement of three disks—it is evident that Lexie has configured a RAID 5 array. RAID 5 perfectly aligns with all the described functionalities, providing a balanced solution for performance, storage, and data redundancy.

Question 2: 

Cindy Williams, a cloud security engineer at an IT company in Austin, Texas, is working with AWS cloud-based services due to their strong security and cost-effectiveness. She has deployed an application within an Amazon Elastic Compute Cloud (EC2) instance.

Which cloud computing service model does the Amazon EC2 instance best represent?

A. SaaS 

B. DaaS 

C. PaaS 

D. IaaS

Correct Answer: D. IaaS

Explanation:

To understand why Amazon Elastic Compute Cloud (EC2) instances represent a specific cloud computing service model, it's essential to delineate the characteristics of the primary cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each model dictates a different level of responsibility and management shared between the cloud provider and the user.

Infrastructure as a Service (IaaS) is the most fundamental and flexible category of cloud computing services. With IaaS, the cloud provider delivers fundamental computing infrastructure—such as virtualized servers (virtual machines), storage, networks, and operating systems—over the internet. The user is responsible for managing the operating system, applications, data, and middleware. The cloud provider, in turn, manages the underlying physical infrastructure, including hardware, virtualization, servers, and networking.

Amazon EC2 perfectly embodies the IaaS model. When Cindy deploys an application on an EC2 instance, she is essentially provisioning a virtual server. AWS manages the physical servers, data centers, and network infrastructure, abstracting these complexities away from Cindy. However, Cindy retains significant control over the EC2 instance. She can choose the operating system (e.g., Windows, various Linux distributions), install any necessary software, configure networking settings, manage data storage, and scale the instance's resources (CPU, RAM) up or down as needed. This level of granular control over the virtualized computing resources, without the burden of managing the physical hardware, is the defining characteristic of IaaS. Cindy is responsible for everything from the operating system upwards, while AWS handles the layers below.

Let's briefly consider why the other options are not appropriate for describing Amazon EC2:

  • Software as a Service (SaaS) delivers complete, ready-to-use software applications over the internet. In a SaaS model, the cloud provider manages everything: the application, data, runtime, middleware, operating system, servers, virtualization, storage, and networking. Users simply access the software, typically through a web browser or mobile app, without needing to worry about how it's hosted or maintained. Common examples include Gmail, Salesforce, and Microsoft 365. EC2 is not an end-user application; it's a foundational service upon which applications can be built and run, making SaaS an incorrect classification.

  • Desktop as a Service (DaaS) is a specific subset of IaaS or PaaS that focuses on delivering virtualized desktop environments to users over a network, typically the internet. While it's technically possible to set up a virtual desktop on an EC2 instance, EC2's primary function and broad utility are not limited to delivering desktops. EC2 is a general-purpose virtual server service, whereas DaaS is a specialized solution for desktop virtualization. Therefore, DaaS does not accurately capture the comprehensive nature of EC2.

  • Platform as a Service (PaaS) provides a complete development and deployment environment in the cloud, with resources that enable users to deliver everything from simple cloud-based apps to sophisticated, enterprise-grade applications. With PaaS, the cloud provider manages the underlying infrastructure, including servers, storage, and networking, as well as the operating system, middleware, and runtime environment. Developers focus solely on writing and deploying their application code. Examples include AWS Elastic Beanstalk, Google App Engine, and Heroku. EC2 differs from PaaS because, while it provides the foundation for applications, it doesn't offer the pre-configured runtime environments or automated deployment tools characteristic of PaaS. On EC2, Cindy still manages the operating system and the installation of specific runtimes or databases, which are typically handled by the PaaS provider.

In conclusion, Amazon EC2's offering of virtualized computing resources where the user controls the operating system and above, while AWS handles the physical infrastructure, is a quintessential example of Infrastructure as a Service (IaaS). This model provides the foundational building blocks for cloud deployments, granting users maximum flexibility and control over their computing environment.

Question 3:

Billy Pratt is a cloud security engineer at a multinational company that migrated all applications and data to AWS in 2012. He needs to analyze and investigate suspicious activities in the AWS environment and find the root cause of these security incidents. 

Which AWS service automatically gathers data from multiple AWS sources and uses machine learning, statistical methods, and graph theory to offer a unified, interactive visualization of resources and users, assisting Billy in his investigation?

A. Amazon Inspector
B. Amazon Detective
C. Amazon GuardDuty
D. Amazon Macie

Correct Answer: B

Explanation:

Billy’s requirement involves deep investigation and root cause analysis of security incidents in an AWS cloud environment. AWS offers several security services, each designed to serve different purposes. The service best suited for collecting, correlating, and visualizing security-related data to help trace suspicious activity is Amazon Detective.

Amazon Detective integrates data from various AWS services such as AWS CloudTrail, VPC Flow Logs, and Amazon GuardDuty findings. It leverages advanced technologies including machine learning, statistical analysis, and graph theory to build a comprehensive and interactive graphical representation of how AWS resources and users interact. This visualization makes it easier for security teams like Billy’s to explore relationships, track suspicious behavior over time, and quickly determine the root cause of security events. Its focus is on simplifying forensic investigation and speeding up incident response.

Other options explained:

  • Amazon Inspector is a vulnerability assessment service that scans AWS workloads for security flaws and compliance issues. While useful for identifying vulnerabilities, it does not provide interactive investigative capabilities or root cause analysis of security events.

  • Amazon GuardDuty is a threat detection service that continuously monitors AWS accounts for malicious or unauthorized activity. It alerts users about potential security issues but does not provide the deeper analytical tools or visualizations that Detective offers for thorough investigation.

  • Amazon Macie is designed to discover and protect sensitive data, such as personally identifiable information (PII) stored in Amazon S3. It focuses on data classification and compliance, not incident investigation.

In summary, Amazon Detective is purpose-built for analyzing, investigating, and visually exploring security data to identify the cause and spread of suspicious activity, making it the ideal choice for Billy.

Question 4:

TCK Bank uses cloud services to store sensitive customer data and explains its data sharing policies to customers. Despite these measures, security flaws in information sharing have allowed hackers to steal critical customer data. 

Under which cloud compliance regulation is the bank likely to face penalties for this data breach?

A. ITAR
B. GLBA
C. NIST
D. GDPR

Correct Answer: B

Explanation:

The scenario involves a bank holding private, sensitive financial information of its customers. The compliance framework that directly governs the protection of such financial data in the United States is the Gramm-Leach-Bliley Act (GLBA). GLBA requires financial institutions to implement safeguards to protect customers’ personal financial information and to clearly disclose their information-sharing practices.

Since TCK Bank has security loopholes that allowed hackers to access sensitive customer data, it would be subject to penalties under GLBA. This law mandates that banks and other financial institutions must protect nonpublic personal information, notify customers about privacy policies, and ensure that third parties also maintain adequate protections. Failure to comply can result in regulatory actions and fines.

Other options clarified:

  • ITAR (International Traffic in Arms Regulations) is concerned with controlling export and import of defense-related technologies and is not relevant to commercial banking data.

  • NIST (National Institute of Standards and Technology) provides cybersecurity standards and best practices but is not a regulatory law and does not directly penalize organizations. Instead, it offers guidance to help organizations comply with laws like GLBA or HIPAA.

  • GDPR (General Data Protection Regulation) is a European Union law protecting the personal data of EU citizens. Unless TCK Bank is handling data of EU residents, GDPR would not apply. Since the bank is presumably U.S.-based and focused on U.S. customer data, GLBA is the more relevant framework.

To conclude, because the bank’s issue involves inadequate protection of U.S. consumers’ financial data, GLBA is the applicable regulatory framework, making option B the correct answer.

Question 5:

Gabriel Bateman works as a cloud security engineer at a company that recently allowed employees to work remotely. His organization uses Microsoft Office 365 to enable secure access to files, emails, and Office applications from multiple devices and locations. 

In this shared cloud environment, who is responsible for managing patches in Microsoft Office 365?

A. Both Gabriel’s organization and Microsoft share patch management responsibilities
B. Gabriel’s organization must outsource patch management to a third party
C. Gabriel’s organization is solely responsible for all patch management
D. Microsoft alone is responsible for patch management

Correct Answer: A

Explanation:

In cloud service models like Microsoft Office 365, patch management follows a shared responsibility model between the cloud provider (Microsoft) and the customer organization. Understanding this division of responsibility is critical for securing the environment and ensuring software stays updated against vulnerabilities.

Microsoft, as the cloud service provider, is accountable for maintaining and patching the underlying infrastructure that powers Office 365. This includes patching servers, network components, virtualization layers, and the Office 365 application platform itself. Microsoft ensures that these backend systems remain secure, stable, and up to date without requiring user intervention.

However, Gabriel’s organization retains responsibility for the client-side environment. This includes ensuring that employees’ devices—such as laptops, desktops, smartphones—are kept patched with the latest security updates. The organization must also manage patches for any software installed on these devices that interacts with Office 365, such as Office applications, web browsers, and antivirus programs. Additionally, if there are any custom configurations, third-party plugins, or integrations with Office 365, these also require patch management by the organization.

The other options are less accurate:

  • B. Outsourcing patch management might be part of an organization's strategy, but it does not absolve the company of ultimate responsibility. Also, it ignores Microsoft’s part in maintaining the cloud infrastructure.

  • C. The organization being fully responsible is incorrect because the infrastructure patching is clearly Microsoft’s duty as part of their cloud service.

  • D. Microsoft having sole responsibility is only partially true since Microsoft manages the cloud platform but not the client devices or third-party software used by employees.

In summary, the shared responsibility model means that while Microsoft manages and patches the Office 365 platform, the organization manages the security of its own endpoints and integrations. This collaboration ensures comprehensive security coverage in a cloud-based environment like Office 365.

Thus, the correct answer is A. Both Gabriel’s organization and Microsoft share responsibilities for patch management.

Question 6:

Kelsey Lewis, working as a cloud security engineer in a BPO, has implemented TLS to secure various communication services including email, VoIP, web traffic, and file transfers. 

Which type of certificate does TLS use to authenticate communication and enable encryption between hosts?

A. X.507 certificates issued by a Certificate Authority
B. X.508 certificates issued by a Certificate Authority
C. X.506 certificates issued by a Certificate Authority
D. X.509 certificates issued by a Certificate Authority

Correct Answer: D

Explanation:

Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over a network by encrypting data and authenticating the parties involved. A fundamental element of TLS is the use of digital certificates for establishing trust and enabling encrypted channels.

The specific certificate standard used by TLS is the X.509 certificate format. These certificates contain a public key along with identity information about the entity (such as a website or server) they are issued to. To be trusted, these certificates are issued and digitally signed by a Certificate Authority (CA), a trusted third party that verifies the identity of certificate requesters.

When two parties establish a TLS connection, they exchange these X.509 certificates to authenticate each other and facilitate secure key exchange. This process ensures that data transmitted between hosts is encrypted, preserving confidentiality and protecting against interception or tampering.

Why the other options are incorrect:

  • A. X.507 certificates: This is not a recognized or valid certificate standard related to TLS.

  • B. X.508 certificates: Similarly, this is an invalid or nonexistent standard for TLS certificates.

  • C. X.506 certificates: This does not exist as a certificate standard and is not used in TLS.

The X.509 standard is universally accepted and implemented in TLS to provide authentication and encryption services. It is foundational for secure communications in web browsers, email servers, VPNs, and many other network services.

Therefore, the correct answer is D. X.509 certificates issued by the Certificate Authority.

Question 7:

Tom Holland is a cloud security engineer at a company in Lansing, Michigan. His company uses cloud services where they handle security for user access, applications, and data, while the cloud provider manages the operating system, hypervisor, physical infrastructure, and network security. 

Based on this division of responsibilities, which cloud computing service model is being used by Tom’s company?

A. Software-as-a-Service
B. On-Premises
C. Infrastructure-as-a-Service
D. Platform-as-a-Service

Correct Answer: C

Explanation:

In cloud computing, the shared responsibility model defines who manages various parts of the technology stack depending on the service type: IaaS, PaaS, or SaaS. This division affects security and operational duties between the customer and the cloud provider.

Tom’s organization controls security related to user access, applications, and data. The cloud provider manages the OS, hypervisor, physical infrastructure, and network security. This setup is typical of the Infrastructure-as-a-Service (IaaS) model.

In IaaS, the provider delivers the fundamental infrastructure—servers, storage, networking, and virtualization. The customer, on the other hand, has full control and responsibility for the operating system, middleware, applications, and data security. This includes tasks like patching the OS, configuring firewalls, and managing application access controls. The customer can customize the environment according to their needs because they control the virtual machines and software stack.

By contrast, in Platform-as-a-Service (PaaS), the cloud provider manages not only the infrastructure but also the operating system and runtime environment, leaving the customer responsible primarily for their applications and data. SaaS providers deliver fully managed applications, where the customer typically only controls user access and some configuration but not the application or infrastructure.

On-Premises environments mean that the organization handles everything internally, from physical hardware to applications, which does not match the described shared responsibility where the cloud provider manages infrastructure layers.

Therefore, since the organization manages user access, application, and data security while the cloud provider manages the underlying infrastructure and OS, Tom’s company is clearly operating under the IaaS cloud service model.

Question 8:

PARADIGM PlayStation migrated its infrastructure to the cloud for enhanced security. It formed an incident response team that monitors hosted websites using SIEM tools. After reviewing network access logs, the team detected an SQL injection attack on one of their websites. 

The team then decided to take the website and the database server offline. At which stage of the incident response lifecycle did the team make this decision?

A. Containment
B. Analysis
C. Coordination and Information Sharing
D. Post-mortem

Correct Answer: A

Explanation:

Incident response is a structured process for addressing and managing the aftermath of a security breach or cyberattack. The lifecycle typically involves several phases: Preparation, Identification, Containment, Eradication, Recovery, and Post-mortem (Lessons Learned).

In this case, the incident response team detected that an SQL injection attack had successfully compromised one of the company’s websites. The decision to take the website and database server offline to prevent further damage corresponds to the Containment phase.

Containment focuses on limiting the scope and impact of a security incident. Once an attack is identified, containment involves immediate actions to isolate affected systems and prevent the threat from spreading. Taking a compromised website and its backend database offline is a classic containment strategy aimed at stopping attackers from causing additional harm or data loss.

The Analysis phase involves deeper investigation to understand the attack’s origin, methods, and impact. It doesn’t include taking direct containment actions like shutting down servers. The team performs analysis both before and after containment to ensure effective response and remediation.

Coordination and Information Sharing involves communicating incident details to internal stakeholders, law enforcement, or external cybersecurity communities. This step helps build awareness but doesn’t involve direct mitigation.

Post-mortem or Lessons Learned happens after the incident is fully resolved. This phase reviews what happened, assesses the response’s effectiveness, and identifies improvements to prevent future incidents.

Therefore, the action of taking systems offline to prevent further compromise is part of Containment—the phase dedicated to halting the attack and minimizing damage before moving on to eradication and recovery.

Question 9:

Global CloudEnv is a cloud service provider offering multiple cloud services to its customers. This provider follows a framework designed to systematically evaluate cloud implementations by outlining security controls that various parties in the cloud supply chain must apply. This framework also serves as a benchmark for organizations listed in the Security, Trust, Assurance, and Risk (STAR) registry. 

Based on this description, which cybersecurity control framework does Global CloudEnv follow?

A. CDMI
B. CSA CAIQ
C. CSA CCM
D. ITU-T X.1601

Correct Answer: C

Explanation:

Global CloudEnv adheres to the Cloud Security Alliance Cloud Controls Matrix (CSA CCM) framework, a comprehensive cybersecurity control framework designed specifically for cloud environments. The CSA CCM provides a detailed catalog of security controls that help organizations evaluate the security posture of cloud providers, ensuring that risks across the cloud supply chain are properly managed.

The framework is closely aligned with the Security, Trust, Assurance, and Risk (STAR) registry, which is a public registry where cloud providers disclose their security compliance and controls in a standardized manner. The STAR registry uses the CSA CCM as a baseline to assess and assure cloud service providers' security measures, helping customers make informed decisions.

The CSA CCM is designed to address the unique challenges of cloud computing by identifying specific security controls for different cloud actors (providers, consumers, auditors). It guides organizations in understanding shared responsibility models and enables risk management by providing control objectives across domains like data security, infrastructure security, identity and access management, and more.

Why the other options are not correct:

  • CDMI (Cloud Data Management Interface) focuses primarily on cloud data storage management standards and interfaces rather than comprehensive security control frameworks. It defines protocols for managing data in the cloud but does not specify security controls for risk assessment.

  • CSA CAIQ (Consensus Assessments Initiative Questionnaire) is a set of questions derived from the CSA CCM that organizations use to assess cloud provider security. However, it is a questionnaire tool rather than a complete control framework itself.

  • ITU-T X.1601 is a telecom standard related to cloud security but lacks widespread industry adoption for cloud security posture assessment compared to the CSA CCM.

In summary, the CSA CCM is the most recognized and comprehensive cybersecurity control framework for cloud service providers aligned with the STAR registry, making it the correct answer.

Question 10:

Global SoftTechSol, a multinational software company, utilizes a public cloud platform to host its services. It employs a debugging tool that allows developers to inspect live applications, identify bugs, and understand code behavior in real-time without disrupting the running service.

Which cloud provider offers this Cloud Debugger tool used by Global SoftTechSol?

A. Google
B. IBM
C. Azure
D. AWS

Correct Answer: A

Explanation:

The Cloud Debugger tool described in the question is a service offered by Google Cloud Platform (GCP). Google Cloud Debugger enables developers to inspect and debug applications running in production environments in real-time, without pausing or impacting the live system’s performance. This capability is crucial for troubleshooting issues that occur under actual production loads, where stopping the application could cause downtime or data loss.

Cloud Debugger integrates seamlessly with Google’s cloud services and supports multiple programming languages. It provides snapshots of the application state at specific points in code execution, allowing developers to analyze variables, call stacks, and application logic as if they were running the program in a local debugging environment.

Why other options are incorrect:

  • IBM Cloud offers developer tools and debugging solutions, but it does not provide a specific product called "Cloud Debugger" with the same real-time inspection capabilities that Google Cloud Debugger provides.

  • Microsoft Azure provides robust monitoring and debugging services such as Azure Monitor and Application Insights. However, Azure does not offer a dedicated tool named "Cloud Debugger" that allows live production debugging in the same manner as Google’s offering.

  • Amazon Web Services (AWS) has tools like AWS X-Ray and CloudWatch for tracing, monitoring, and logging, but it lacks a product explicitly named or functioning like "Cloud Debugger" that provides interactive, real-time debugging of live applications without interruption.

Thus, the Cloud Debugger mentioned is uniquely associated with Google Cloud Platform, making Google the correct answer.


SPECIAL OFFER: GET 10% OFF

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |