Exams > Google > Professional Cloud Security Engineer
Professional Cloud Security Engineer
Page 8 out of 18 pages Questions 71-80 out of 173 questions
Question#71

You are asked to recommend a solution to store and retrieve sensitive configuration data from an application that runs on Compute Engine. Which option should you recommend?

  • A. Cloud Key Management Service
  • B. Compute Engine guest attributes
  • C. Compute Engine custom metadata
  • D. Secret Manager
Discover Answer Hide Answer

D
Reference:
https://www.freecodecamp.org/news/google-cloud-platform-from-zero-to-hero/

Question#72

You need to implement an encryption at-rest strategy that reduces key management complexity for non-sensitive data and protects sensitive data while providing the flexibility of controlling the key residency and rotation schedule. FIPS 140-2 L1 compliance is required for all data types. What should you do?

  • A. Encrypt non-sensitive data and sensitive data with Cloud External Key Manager.
  • B. Encrypt non-sensitive data and sensitive data with Cloud Key Management Service
  • C. Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud External Key Manager.
  • D. Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud Key Management Service.
Discover Answer Hide Answer

B

Question#73

Your company wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems.
This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

  • A. Deterministic encryption
  • B. Secure, key-based hashes
  • C. Format-preserving encryption
  • D. Cryptographic hashing
Discover Answer Hide Answer

B
Reference:
https://cloud.google.com/blog/products/identity-security/take-charge-of-your-data-how-tokenization-makes-data-usable-without-sacrificing-privacy

Question#74

An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

  • A. Organization Administrator
  • B. Project Creator
  • C. Billing Account Viewer
  • D. Billing Account Costs Manager
  • E. Billing Account User
Discover Answer Hide Answer

AE
Reference:
https://cloud.google.com/iam/docs/job-functions/billing

Question#75

You are designing a new governance model for your organization's secrets that are stored in Secret Manager. Currently, secrets for Production and Non-
Production applications are stored and accessed using service accounts. Your proposed solution must:
✑ Provide granular access to secrets
✑ Give you control over the rotation schedules for the encryption keys that wrap your secrets
✑ Maintain environment separation
✑ Provide ease of management
Which approach should you take?

  • A. 1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
  • B. 1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
  • C. 1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
  • D. 1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
Discover Answer Hide Answer

A

Question#76

You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data. Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud.
What solution should you propose?

  • A. Use customer-managed encryption keys.
  • B. Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.
  • C. Enable Admin activity logs to monitor access to resources.
  • D. Enable Access Transparency logs with Access Approval requests for Google employees.
Discover Answer Hide Answer

D

Question#77

You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

  • A. SSO SAML as a third-party IdP
  • B. Identity Platform
  • C. OpenID Connect
  • D. Identity-Aware Proxy
  • E. Cloud Identity
Discover Answer Hide Answer

AC
Reference:
https://cloud.google.com/identity/solutions/enable-sso

Question#78

You work for a large organization where each business unit has thousands of users. You need to delegate management of access control permissions to each business unit. You have the following requirements:
✑ Each business unit manages access controls for their own projects.
✑ Each business unit manages access control permissions at scale.
✑ Business units cannot access other business units' projects.
✑ Users lose their access if they move to a different business unit or leave the company.
✑ Users and access control permissions are managed by the on-premises directory service.
What should you do? (Choose two.)

  • A. Use VPC Service Controls to create perimeters around each business unit's project.
  • B. Organize projects in folders, and assign permissions to Google groups at the folder level.
  • C. Group business units based on Organization Units (OUs) and manage permissions based on OUs
  • D. Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.
  • E. Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.
Discover Answer Hide Answer

BE

Question#79

Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:
✑ Scans must run at least once per week
✑ Must be able to detect cross-site scripting vulnerabilities
✑ Must be able to authenticate using Google accounts
Which solution should you use?

  • A. Google Cloud Armor
  • B. Web Security Scanner
  • C. Security Health Analytics
  • D. Container Threat Detection
Discover Answer Hide Answer

B
Reference:
https://cloud.google.com/security-command-center/docs/concepts-web-security-scanner-overview

Question#80

An organization is moving applications to Google Cloud while maintaining a few mission-critical applications on-premises. The organization must transfer the data at a bandwidth of at least 50 Gbps. What should they use to ensure secure continued connectivity between sites?

  • A. Dedicated Interconnect
  • B. Cloud Router
  • C. Cloud VPN
  • D. Partner Interconnect
Discover Answer Hide Answer

A
Reference:
https://cloud.google.com/architecture/migration-to-google-cloud-transferring-your-large-datasets

chevron rightPrevious Nextchevron right