ExamGecko
Ask Question

Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

You are implementing data protection by design and in accordance with GDPR requirements. As part of design reviews, you are told that you need to manage the encryption key for a solution that includes workloads for Compute Engine, Google Kubernetes Engine, Cloud Storage, BigQuery, and Pub/Sub. Which option should you choose for this implementation?

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

Which Identity-Aware Proxy role should you grant to an Identity and Access Management (IAM) user to access HTTPS resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

You need to audit the network segmentation for your Google Cloud footprint. You currently operate Production and Non-Production infrastructure-as-a-service (IaaS) environments. All your VM instances are deployed without any service account customization.

After observing the traffic in your custom network, you notice that all instances can communicate freely -- despite tag-based VPC firewall rules in place to segment traffic properly -- with a priority of 1000. What are the most likely reasons for this behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

You are creating a new infrastructure CI/CD pipeline to deploy hundreds of ephemeral projects in your Google Cloud organization to enable your users to interact with Google Cloud. You want to restrict the use of the default networks in your organization while following Google-recommended best practices. What should you do?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

You are a security administrator at your company and are responsible for managing access controls (identification, authentication, and authorization) on Google Cloud. Which Google-recommended best practices should you follow when configuring authentication and authorization? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

You have been tasked with inspecting IP packet data for invalid or malicious content. What should you do?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

You have the following resource hierarchy. There is an organization policy at each node in the hierarchy as shown. Which load balancer types are denied in VPC A?

Google Professional Cloud Security Engineer image Question 167 29449 09182024191401000000

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

Your security team wants to implement a defense-in-depth approach to protect sensitive data stored in a Cloud Storage bucket. Your team has the following requirements:

The Cloud Storage bucket in Project A can only be readable from Project B.

The Cloud Storage bucket in Project A cannot be accessed from outside the network.

Data in the Cloud Storage bucket cannot be copied to an external Cloud Storage bucket.

What should the security team do?

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

You need to create a VPC that enables your security team to control network resources such as firewall rules. How should you configure the network to allow for separation of duties for network resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

You are onboarding new users into Cloud Identity and discover that some users have created consumer user accounts using the corporate domain name. How should you manage these consumer user accounts with Cloud Identity?

Become a Premium Member for full access
  Unlock Premium Member
Total 251 questions
Go to page: of 26
Search

Related questions