Exams > Google > Professional Cloud Security Engineer
Professional Cloud Security Engineer
Page 9 out of 18 pages Questions 81-90 out of 173 questions
Question#81

Your organization has had a few recent DDoS attacks. You need to authenticate responses to domain name lookups. Which Google Cloud service should you use?

  • A. Cloud DNS with DNSSEC
  • B. Cloud NAT
  • C. HTTP(S) Load Balancing
  • D. Google Cloud Armor
Discover Answer Hide Answer

A
Reference:
https://developers.google.com/speed/public-dns/faq

Question#82

Your Security team believes that a former employee of your company gained unauthorized access to Google Cloud resources some time in the past 2 months by using a service account key. You need to confirm the unauthorized access and determine the user activity. What should you do?

  • A. Use Security Health Analytics to determine user activity.
  • B. Use the Cloud Monitoring console to filter audit logs by user.
  • C. Use the Cloud Data Loss Prevention API to query logs in Cloud Storage.
  • D. Use the Logs Explorer to search for user activity.
Discover Answer Hide Answer

B

Question#83

Your company requires the security and network engineering teams to identify all network anomalies within and across VPCs, internal traffic from VMs to VMs, traffic between end locations on the internet and VMs, and traffic between VMs to Google Cloud services in production. Which method should you use?

  • A. Define an organization policy constraint.
  • B. Configure packet mirroring policies.
  • C. Enable VPC Flow Logs on the subnet.
  • D. Monitor and analyze Cloud Audit Logs.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/architecture/best-practices-vpc-design

Question#84

Your company has been creating users manually in Cloud Identity to provide access to Google Cloud resources. Due to continued growth of the environment, you want to authorize the Google Cloud Directory Sync (GCDS) instance and integrate it with your on-premises LDAP server to onboard hundreds of users. You are required to:
✑ Replicate user and group lifecycle changes from the on-premises LDAP server in Cloud Identity.
✑ Disable any manually created users in Cloud Identity.
You have already configured the LDAP search attributes to include the users and security groups in scope for Google Cloud. What should you do next to complete this solution?

  • A. 1. Configure the option to suspend domain users not found in LDAP. 2. Set up a recurring GCDS task.
  • B. 1. Configure the option to delete domain users not found in LDAP. 2. Run GCDS after user and group lifecycle changes.
  • C. 1. Configure the LDAP search attributes to exclude manually created Cloud Identity users not found in LDAP. 2. Set up a recurring GCDS task.
  • D. 1. Configure the LDAP search attributes to exclude manually created Cloud Identity users not found in LDAP. 2. Run GCDS after user and group lifecycle changes.
Discover Answer Hide Answer

D
Reference:
https://www.appsadmins.com/blog/your-how-to-for-provisioning-in-g-suite-part-2-users

Question#85

You are troubleshooting access denied errors between Compute Engine instances connected to a Shared VPC and BigQuery datasets. The datasets reside in a project protected by a VPC Service Controls perimeter. What should you do?

  • A. Add the host project containing the Shared VPC to the service perimeter.
  • B. Add the service project where the Compute Engine instances reside to the service perimeter.
  • C. Create a service perimeter between the service project where the Compute Engine instances reside and the host project that contains the Shared VPC.
  • D. Create a perimeter bridge between the service project where the Compute Engine instances reside and the perimeter that contains the protected BigQuery datasets.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/vpc-service-controls/docs/troubleshooting

Question#86

You recently joined the networking team supporting your company's Google Cloud implementation. You are tasked with familiarizing yourself with the firewall rules configuration and providing recommendations based on your networking and Google Cloud experience. What product should you recommend to detect firewall rules that are overlapped by attributes from other firewall rules with higher or equal priority?

  • A. Security Command Center
  • B. Firewall Rules Logging
  • C. VPC Flow Logs
  • D. Firewall Insights
Discover Answer Hide Answer

D
Reference:
https://cloud.google.com/network-intelligence-center/docs/firewall-insights/concepts/overview

Question#87

The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements:
✑ Follow the least privilege model by having only view access to logs.
✑ Have access to Admin Activity logs.
✑ Have access to Data Access logs.
✑ Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?

  • A. roles/logging.privateLogViewer
  • B. roles/logging.admin
  • C. roles/viewer
  • D. roles/logging.viewer
Discover Answer Hide Answer

B
Reference:
https://cloud.google.com/logging/docs/access-control

Question#88

You are exporting application logs to Cloud Storage. You encounter an error message that the log sinks don't support uniform bucket-level access policies. How should you resolve this error?

  • A. Change the access control model for the bucket
  • B. Update your sink with the correct bucket destination.
  • C. Add the roles/logging.logWriter Identity and Access Management (IAM) role to the bucket for the log sink identity.
  • D. Add the roles/logging.bucketWriter Identity and Access Management (IAM) role to the bucket for the log sink identity.
Discover Answer Hide Answer

A
Reference:
https://sysdig.com/blog/gcp-security-best-practices/

Question#89

A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs.
What should you do?

  • A. Create an Alerting Policy in Stackdriver using a Process Health condition, checking that the number of executions of the script remains below the desired threshold. Enable notifications.
  • B. Create an Alerting Policy in Stackdriver using the CPU usage metric. Set the threshold to 80% to be notified when the CPU usage goes above this 80%.
  • C. Log every execution of the script to Stackdriver Logging. Create a User-defined metric in Stackdriver Logging on the logs, and create a Stackdriver Dashboard displaying the metric.
  • D. Log every execution of the script to Stackdriver Logging. Configure BigQuery as a log sink, and create a BigQuery scheduled query to count the number of executions in a specific timeframe.
Discover Answer Hide Answer

C
Reference:
https://cloud.google.com/logging/docs/logs-based-metrics/

Question#90

Your team needs to obtain a unified log view of all development cloud projects in your SIEM. The development projects are under the NONPROD organization folder with the test and pre-production projects. The development projects share the ABC-BILLING billing account with the rest of the organization.
Which logging export strategy should you use to meet the requirements?

  • A. 1. Export logs to a Cloud Pub/Sub topic with folders/NONPROD parent and includeChildren property set to True in a dedicated SIEM project. 2. Subscribe SIEM to the topic.
  • B. 1. Create a Cloud Storage sink with billingAccounts/ABC-BILLING parent and includeChildren property set to False in a dedicated SIEM project. 2. Process Cloud Storage objects in SIEM.
  • C. 1. Export logs in each dev project to a Cloud Pub/Sub topic in a dedicated SIEM project. 2. Subscribe SIEM to the topic.
  • D. 1. Create a Cloud Storage sink with a publicly shared Cloud Storage bucket in each project. 2. Process Cloud Storage objects in SIEM.
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right