Exams > Google > Professional Cloud Security Engineer
Professional Cloud Security Engineer
Page 3 out of 18 pages Questions 21-30 out of 173 questions
Question#21

A customer deployed an application on Compute Engine that takes advantage of the elastic nature of cloud computing.
How can you work with Infrastructure Operations Engineers to best ensure that Windows Compute Engine VMs are up to date with all the latest OS patches?

  • A. Build new base images when patches are available, and use a CI/CD pipeline to rebuild VMs, deploying incrementally.
  • B. Federate a Domain Controller into Compute Engine, and roll out weekly patches via Group Policy Object.
  • C. Use Deployment Manager to provision updated VMs into new serving Instance Groups (IGs).
  • D. Reboot all VMs during the weekly maintenance window and allow the StartUp Script to download the latest patches from the internet.
Discover Answer Hide Answer

D

Question#22

Your team needs to make sure that their backend database can only be accessed by the frontend application and no other instances on the network.
How should your team design this network?

  • A. Create an ingress firewall rule to allow access only from the application to the database using firewall tags.
  • B. Create a different subnet for the frontend application and database to ensure network isolation.
  • C. Create two VPC networks, and connect the two networks using Cloud VPN gateways to ensure network isolation.
  • D. Create two VPC networks, and connect the two networks using VPC peering to ensure network isolation.
Discover Answer Hide Answer

A

Question#23

An organization receives an increasing number of phishing emails.
Which method should be used to protect employee credentials in this situation?

  • A. Multifactor Authentication
  • B. A strict password policy
  • C. Captcha on login pages
  • D. Encrypted emails
Discover Answer Hide Answer

D

Question#24

A customer is collaborating with another company to build an application on Compute Engine. The customer is building the application tier in their GCP
Organization, and the other company is building the storage tier in a different GCP Organization. This is a 3-tier web application. Communication between portions of the application must not traverse the public internet by any means.
Which connectivity option should be implemented?

  • A. VPC peering
  • B. Cloud VPN
  • C. Cloud Interconnect
  • D. Shared VPC
Discover Answer Hide Answer

B

Question#25

Your team wants to make sure Compute Engine instances running in your production project do not have public IP addresses. The frontend application Compute
Engine instances will require public IPs. The product engineers have the Editor role to modify resources. Your team wants to enforce this requirement.
How should your team meet these requirements?

  • A. Enable Private Access on the VPC network in the production project.
  • B. Remove the Editor role and grant the Compute Admin IAM role to the engineers.
  • C. Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.
  • D. Set up a VPC network with two subnets: one with public IPs and one without public IPs.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/compute/docs/ip-addresses/reserve-static-external-ip-address

Question#26

Which two security characteristics are related to the use of VPC peering to connect two VPC networks? (Choose two.)

  • A. Central management of routes, firewalls, and VPNs for peered networks
  • B. Non-transitive peered networks; where only directly peered networks can communicate
  • C. Ability to peer networks that belong to different Google Cloud organizations
  • D. Firewall rules that can be created with a tag from one peered network to another peered network
  • E. Ability to share specific subnets across peered networks
Discover Answer Hide Answer

BC

Question#27

A patch for a vulnerability has been released, and a DevOps team needs to update their running containers in Google Kubernetes Engine (GKE).
How should the DevOps team accomplish this?

  • A. Use Puppet or Chef to push out the patch to the running container.
  • B. Verify that auto upgrade is enabled; if so, Google will upgrade the nodes in a GKE cluster.
  • C. Update the application code or apply a patch, build a new image, and redeploy it.
  • D. Configure containers to automatically upgrade when the base image is available in Container Registry.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/kubernetes-engine/docs/security-bulletins

Question#28

A company is running their webshop on Google Kubernetes Engine and wants to analyze customer transactions in BigQuery. You need to ensure that no credit card numbers are stored in BigQuery
What should you do?

  • A. Create a BigQuery view with regular expressions matching credit card numbers to query and delete affected rows.
  • B. Use the Cloud Data Loss Prevention API to redact related infoTypes before data is ingested into BigQuery.
  • C. Leverage Security Command Center to scan for the assets of type Credit Card Number in BigQuery.
  • D. Enable Cloud Identity-Aware Proxy to filter out credit card numbers before storing the logs in BigQuery.
Discover Answer Hide Answer

D

Question#29

A customer wants to deploy a large number of 3-tier web applications on Compute Engine.
How should the customer ensure authenticated network separation between the different tiers of the application?

  • A. Run each tier in its own Project, and segregate using Project labels.
  • B. Run each tier with a different Service Account (SA), and use SA-based firewall rules.
  • C. Run each tier in its own subnet, and use subnet-based firewall rules.
  • D. Run each tier with its own VM tags, and use tag-based firewall rules.
Discover Answer Hide Answer

C

Question#30

A manager wants to start retaining security event logs for 2 years while minimizing costs. You write a filter to select the appropriate log entries.
Where should you export the logs?

  • A. BigQuery datasets
  • B. Cloud Storage buckets
  • C. StackDriver logging
  • D. Cloud Pub/Sub topics
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/logging/docs/exclusions

chevron rightPrevious Nextchevron right