ExamGecko
Home Home / Google / Professional Cloud Security Engineer

Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Your company wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems.

This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

A.
Deterministic encryption
A.
Deterministic encryption
Answers
B.
Secure, key-based hashes
B.
Secure, key-based hashes
Answers
C.
Format-preserving encryption
C.
Format-preserving encryption
Answers
D.
Cryptographic hashing
D.
Cryptographic hashing
Answers
Suggested answer: A

Explanation:

''This encryption method is reversible, which helps to maintain referential integrity across your database and has no character-set limitations.'' https://cloud.google.com/blog/products/identity-security/take-charge-of-your-data-how-tokenization-makes-data-usable-without-sacrificing-privacy

https://cloud.google.com/dlp/docs/pseudonymization

FPE provides fewer security guarantees compared to other deterministic encryption methods such as AES-SIV. For these reasons, Google strongly recommends using deterministic encryption with AES-SIV instead of FPE for all security sensitive use cases. Other methods like deterministic encryption using AES-SIV provide these stronger security guarantees and are recommended for tokenization use cases unless length and character set preservation are strict requirements---for example, for backward compatibility with a legacy data system.

An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

A.
Organization Administrator
A.
Organization Administrator
Answers
B.
Project Creator
B.
Project Creator
Answers
C.
Billing Account Viewer
C.
Billing Account Viewer
Answers
D.
Billing Account Costs Manager
D.
Billing Account Costs Manager
Answers
E.
Billing Account User
E.
Billing Account User
Answers
Suggested answer: C, D

Explanation:

https://cloud.google.com/billing/docs/how-to/billing-access#overview-of-cloud-billing-roles-in-cloud-iam

Billing Account Costs Manager (roles/billing.costsManager)

- Manage budgets and view and export cost information of billing accounts (but not pricing information)

Billing Account Viewer (roles/billing.viewer)

- View billing account cost information and transactions.

You are designing a new governance model for your organization's secrets that are stored in Secret Manager. Currently, secrets for Production and Non-Production applications are stored and accessed using service accounts. Your proposed solution must:

Provide granular access to secrets

Give you control over the rotation schedules for the encryption keys that wrap your secrets

Maintain environment separation

Provide ease of management

Which approach should you take?

A.
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
A.
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
Answers
B.
1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
B.
1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
Answers
C.
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
C.
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.
Answers
D.
1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
D.
1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
Answers
Suggested answer: A

Explanation:

Provide granular access to secrets: 2.Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. Give you control over the rotation schedules for the encryption keys that wrap your secrets: 3. Use customer-managed encryption keys to encrypt secrets. Maintain environment separation: 1. Use separate Google Cloud projects to store Production and Non-Production secrets.

You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud. What solution should you propose?

A.
Use customer-managed encryption keys.
A.
Use customer-managed encryption keys.
Answers
B.
Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.
B.
Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.
Answers
C.
Enable Admin activity logs to monitor access to resources.
C.
Enable Admin activity logs to monitor access to resources.
Answers
D.
Enable Access Transparency logs with Access Approval requests for Google employees.
D.
Enable Access Transparency logs with Access Approval requests for Google employees.
Answers
Suggested answer: D

Explanation:

https://cloud.google.com/access-transparency Access approval Explicitly approve access to your data or configurations on Google Cloud. Access Approval requests, when combined with Access Transparency logs, can be used to audit an end-to-end chain from support ticket to access request to approval, to eventual access.

You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

A.
SSO SAML as a third-party IdP
A.
SSO SAML as a third-party IdP
Answers
B.
Identity Platform
B.
Identity Platform
Answers
C.
OpenID Connect
C.
OpenID Connect
Answers
D.
Identity-Aware Proxy
D.
Identity-Aware Proxy
Answers
E.
Cloud Identity
E.
Cloud Identity
Answers
Suggested answer: A, C

Explanation:

To provide users with SSO-based access to selected cloud apps, Cloud Identity as your IdP supports the OpenID Connect (OIDC) and Security Assertion Markup Language 2.0 (SAML) protocols. https://cloud.google.com/identity/solutions/enable-sso

You work for a large organization where each business unit has thousands of users. You need to delegate management of access control permissions to each business unit. You have the following requirements:

Each business unit manages access controls for their own projects.

Each business unit manages access control permissions at scale.

Business units cannot access other business units' projects.

Users lose their access if they move to a different business unit or leave the company.

Users and access control permissions are managed by the on-premises directory service.

What should you do? (Choose two.)

A.
Use VPC Service Controls to create perimeters around each business unit's project.
A.
Use VPC Service Controls to create perimeters around each business unit's project.
Answers
B.
Organize projects in folders, and assign permissions to Google groups at the folder level.
B.
Organize projects in folders, and assign permissions to Google groups at the folder level.
Answers
C.
Group business units based on Organization Units (OUs) and manage permissions based on OUs.
C.
Group business units based on Organization Units (OUs) and manage permissions based on OUs.
Answers
D.
Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.
D.
Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.
Answers
E.
Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.
E.
Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.
Answers
Suggested answer: B, E

Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:

Scans must run at least once per week

Must be able to detect cross-site scripting vulnerabilities

Must be able to authenticate using Google accounts

Which solution should you use?

A.
Google Cloud Armor
A.
Google Cloud Armor
Answers
B.
Web Security Scanner
B.
Web Security Scanner
Answers
C.
Security Health Analytics
C.
Security Health Analytics
Answers
D.
Container Threat Detection
D.
Container Threat Detection
Answers
Suggested answer: B

Explanation:

Web Security Scanner identifies security vulnerabilities in your App Engine, Google Kubernetes Engine (GKE), and Compute Engine web applications. https://cloud.google.com/security-command-center/docs/concepts-web-security-scanner-overview

An organization is moving applications to Google Cloud while maintaining a few mission-critical applications on-premises. The organization must transfer the data at a bandwidth of at least 50 Gbps. What should they use to ensure secure continued connectivity between sites?

A.
Dedicated Interconnect
A.
Dedicated Interconnect
Answers
B.
Cloud Router
B.
Cloud Router
Answers
C.
Cloud VPN
C.
Cloud VPN
Answers
D.
Partner Interconnect
D.
Partner Interconnect
Answers
Suggested answer: A

Explanation:

https://cloud.google.com/network-connectivity/docs/interconnect/concepts/overview

Your organization has had a few recent DDoS attacks. You need to authenticate responses to domain name lookups. Which Google Cloud service should you use?

A.
Cloud DNS with DNSSEC
A.
Cloud DNS with DNSSEC
Answers
B.
Cloud NAT
B.
Cloud NAT
Answers
C.
HTTP(S) Load Balancing
C.
HTTP(S) Load Balancing
Answers
D.
Google Cloud Armor
D.
Google Cloud Armor
Answers
Suggested answer: A

Explanation:

The Domain Name System Security Extensions (DNSSEC) is a feature of the Domain Name System (DNS) that authenticates responses to domain name lookups. It does not provide privacy protections for those lookups, but prevents attackers from manipulating or poisoning the responses to DNS requests. https://cloud.google.com/dns/docs/dnssec

Your Security team believes that a former employee of your company gained unauthorized access to Google Cloud resources some time in the past 2 months by using a service account key. You need to confirm the unauthorized access and determine the user activity. What should you do?

A.
Use Security Health Analytics to determine user activity.
A.
Use Security Health Analytics to determine user activity.
Answers
B.
Use the Cloud Monitoring console to filter audit logs by user.
B.
Use the Cloud Monitoring console to filter audit logs by user.
Answers
C.
Use the Cloud Data Loss Prevention API to query logs in Cloud Storage.
C.
Use the Cloud Data Loss Prevention API to query logs in Cloud Storage.
Answers
D.
Use the Logs Explorer to search for user activity.
D.
Use the Logs Explorer to search for user activity.
Answers
Suggested answer: D

Explanation:

We use audit logs by searching the Service Account and checking activities in the past 2 months. (the user identity will not be seen since he used the SA identity but we can make correlations based on ip address, working hour, etc. )

Total 235 questions
Go to page: of 24