Exams > Google > Professional Cloud Security Engineer
Professional Cloud Security Engineer
Page 6 out of 18 pages Questions 51-60 out of 173 questions
Question#51

An organization's security and risk management teams are concerned about where their responsibility lies for certain production workloads they are running in
Google Cloud and where Google's responsibility lies. They are mostly running workloads using Google Cloud's platform-as-a-Service (PaaS) offerings, including
App Engine primarily.
Which area in the technology stack should they focus on as their primary responsibility when using App Engine?

  • A. Configuring and monitoring VPC Flow Logs
  • B. Defending against XSS and SQLi attacks
  • C. Managing the latest updates and security patches for the Guest OS
  • D. Encrypting all stored data
Discover Answer Hide Answer

D

Question#52

An engineering team is launching a web application that will be public on the internet. The web application is hosted in multiple GCP regions and will be directed to the respective backend based on the URL request.
Your team wants to avoid exposing the application directly on the internet and wants to deny traffic from a specific list of malicious IP addresses.
Which solution should your team implement to meet these requirements?

  • A. Cloud Armor
  • B. Network Load Balancing
  • C. SSL Proxy Load Balancing
  • D. NAT Gateway
Discover Answer Hide Answer

A
Reference:
https://cloud.google.com/armor/docs/security-policy-concepts

Question#53

A customer is running an analytics workload on Google Cloud Platform (GCP) where Compute Engine instances are accessing data stored on Cloud Storage.
Your team wants to make sure that this workload will not be able to access, or be accessed from, the internet.
Which two strategies should your team use to meet these requirements? (Choose two.)

  • A. Configure Private Google Access on the Compute Engine subnet
  • B. Avoid assigning public IP addresses to the Compute Engine cluster.
  • C. Make sure that the Compute Engine cluster is running on a separate subnet.
  • D. Turn off IP forwarding on the Compute Engine instances in the cluster.
  • E. Configure a Cloud NAT gateway.
Discover Answer Hide Answer

AB

Question#54

A customer wants to run a batch processing system on VMs and store the output files in a Cloud Storage bucket. The networking and security teams have decided that no VMs may reach the public internet.
How should this be accomplished?

  • A. Create a firewall rule to block internet traffic from the VM.
  • B. Provision a NAT Gateway to access the Cloud Storage API endpoint.
  • C. Enable Private Google Access.
  • D. Mount a Cloud Storage bucket as a local filesystem on every VM.
Discover Answer Hide Answer

B

Question#55

As adoption of the Cloud Data Loss Prevention (Cloud DLP) API grows within your company, you need to optimize usage to reduce cost. Cloud DLP target data is stored in Cloud Storage and BigQuery. The location and region are identified as a suffix in the resource name.
Which cost reduction options should you recommend?

  • A. Set appropriate rowsLimit value on BigQuery data hosted outside the US and set appropriate bytesLimitPerFile value on multiregional Cloud Storage buckets.
  • B. Set appropriate rowsLimit value on BigQuery data hosted outside the US, and minimize transformation units on multiregional Cloud Storage buckets.
  • C. Use rowsLimit and bytesLimitPerFile to sample data and use CloudStorageRegexFileSet to limit scans.
  • D. Use FindingLimits and TimespanContfig to sample data and minimize transformation units.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/dlp/docs/reference/rest/v2/InspectJobConfig

Question#56

Your team uses a service account to authenticate data transfers from a given Compute Engine virtual machine instance of to a specified Cloud Storage bucket. An engineer accidentally deletes the service account, which breaks application functionality. You want to recover the application as quickly as possible without compromising security.
What should you do?

  • A. Temporarily disable authentication on the Cloud Storage bucket.
  • B. Use the undelete command to recover the deleted service account.
  • C. Create a new service account with the same name as the deleted service account.
  • D. Update the permissions of another existing service account and supply those credentials to the applications.
Discover Answer Hide Answer

B
Reference:
https://cloud.google.com/iam/docs/creating-managing-service-accounts#undeleting_a_service_account

Question#57

You are the Security Admin in your company. You want to synchronize all security groups that have an email address from your LDAP directory in Cloud IAM.
What should you do?

  • A. Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have ג€user email addressג€ as the attribute to facilitate one-way sync.
  • B. Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have ג€user email addressג€ as the attribute to facilitate bidirectional sync.
  • C. Use a management tool to sync the subset based on the email address attribute. Create a group in the Google domain. A group created in a Google domain will automatically have an explicit Google Cloud Identity and Access Management (IAM) role.
  • D. Use a management tool to sync the subset based on group object class attribute. Create a group in the Google domain. A group created in a Google domain will automatically have an explicit Google Cloud Identity and Access Management (IAM) role.
Discover Answer Hide Answer

A

Question#58

You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.
What should you do?

  • A. Query Data Access logs.
  • B. Query Admin Activity logs.
  • C. Query Access Transparency logs.
  • D. Query Stackdriver Monitoring Workspace.
Discover Answer Hide Answer

A
Reference:
https://cloud.google.com/iam/docs/audit-logging/examples-service-accounts

Question#59

You have an application where the frontend is deployed on a managed instance group in subnet A and the data layer is stored on a mysql Compute Engine virtual machine (VM) in subnet B on the same VPC. Subnet A and Subnet B hold several other Compute Engine VMs. You only want to allow the application frontend to access the data in the application's mysql instance on port 3306.
What should you do?

  • A. Configure an ingress firewall rule that allows communication from the src IP range of subnet A to the tag "data-tag" that is applied to the mysql Compute Engine VM on port 3306.
  • B. Configure an ingress firewall rule that allows communication from the frontend's unique service account to the unique service account of the mysql Compute Engine VM on port 3306.
  • C. Configure a network tag "fe-tag" to be applied to all instances in subnet A and a network tag "data-tag" to be applied to all instances in subnet B. Then configure an egress firewall rule that allows communication from Compute Engine VMs tagged with data-tag to destination Compute Engine VMs tagged fe- tag.
  • D. Configure a network tag "fe-tag" to be applied to all instances in subnet A and a network tag "data-tag" to be applied to all instances in subnet B. Then configure an ingress firewall rule that allows communication from Compute Engine VMs tagged with fe-tag to destination Compute Engine VMs tagged with data-tag.
Discover Answer Hide Answer

B

Question#60

Your company operates an application instance group that is currently deployed behind a Google Cloud load balancer in us-central-1 and is configured to use the
Standard Tier network. The infrastructure team wants to expand to a second Google Cloud region, us-east-2. You need to set up a single external IP address to distribute new requests to the instance groups in both regions.
What should you do?

  • A. Change the load balancer backend configuration to use network endpoint groups instead of instance groups.
  • B. Change the load balancer frontend configuration to use the Premium Tier network, and add the new instance group.
  • C. Create a new load balancer in us-east-2 using the Standard Tier network, and assign a static external IP address.
  • D. Create a Cloud VPN connection between the two regions, and enable Google Private Access.
Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right