ExamGecko
Home Home / Google / Professional Cloud Security Engineer

Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











An organization is starting to move its infrastructure from its on-premises environment to Google Cloud Platform (GCP). The first step the organization wants to take is to migrate its current data backup and disaster recovery solutions to GCP for later analysis. The organization's production environment will remain on- premises for an indefinite time. The organization wants a scalable and cost-efficient solution.

Which GCP solution should the organization use?

A.
BigQuery using a data pipeline job with continuous updates
A.
BigQuery using a data pipeline job with continuous updates
Answers
B.
Cloud Storage using a scheduled task and gsutil
B.
Cloud Storage using a scheduled task and gsutil
Answers
C.
Compute Engine Virtual Machines using Persistent Disk
C.
Compute Engine Virtual Machines using Persistent Disk
Answers
D.
Cloud Datastore using regularly scheduled batch upload jobs
D.
Cloud Datastore using regularly scheduled batch upload jobs
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/solutions/dr-scenarios-planning-guide#use-cloud-storage-as-part-of-your-daily-backup-routine

You are creating an internal App Engine application that needs to access a user's Google Drive on the user's behalf. Your company does not want to rely on the current user's credentials. It also wants to follow Google- recommended practices.

What should you do?

A.
Create a new Service account, and give all application users the role of Service Account User.
A.
Create a new Service account, and give all application users the role of Service Account User.
Answers
B.
Create a new Service account, and add all application users to a Google Group. Give this group the role of Service Account User.
B.
Create a new Service account, and add all application users to a Google Group. Give this group the role of Service Account User.
Answers
C.
Use a dedicated G Suite Admin account, and authenticate the application's operations with these G Suite credentials.
C.
Use a dedicated G Suite Admin account, and authenticate the application's operations with these G Suite credentials.
Answers
D.
Create a new service account, and grant it G Suite domain-wide delegation. Have the application use it to impersonate the user.
D.
Create a new service account, and grant it G Suite domain-wide delegation. Have the application use it to impersonate the user.
Answers
Suggested answer: D

Explanation:

https://developers.google.com/admin-sdk/directory/v1/guides/delegation

A customer wants to move their sensitive workloads to a Compute Engine-based cluster using Managed Instance Groups (MIGs). The jobs are bursty and must be completed quickly. They have a requirement to be able to manage and rotate the encryption keys.

Which boot disk encryption solution should you use on the cluster to meet this customer's requirements?

A.
Customer-supplied encryption keys (CSEK)
A.
Customer-supplied encryption keys (CSEK)
Answers
B.
Customer-managed encryption keys (CMEK) using Cloud Key Management Service (KMS)
B.
Customer-managed encryption keys (CMEK) using Cloud Key Management Service (KMS)
Answers
C.
Encryption by default
C.
Encryption by default
Answers
D.
Pre-encrypting files before transferring to Google Cloud Platform (GCP) for analysis
D.
Pre-encrypting files before transferring to Google Cloud Platform (GCP) for analysis
Answers
Suggested answer: B

Explanation:

Reference https://cloud.google.com/kubernetes-engine/docs/how-to/dynamic-provisioning-cmek

Your company is using Cloud Dataproc for its Spark and Hadoop jobs. You want to be able to create, rotate,

and destroy symmetric encryption keys used for the persistent disks used by Cloud Dataproc. Keys can be stored in the cloud.

What should you do?

A.
Use the Cloud Key Management Service to manage the data encryption key (DEK).
A.
Use the Cloud Key Management Service to manage the data encryption key (DEK).
Answers
B.
Use the Cloud Key Management Service to manage the key encryption key (KEK).
B.
Use the Cloud Key Management Service to manage the key encryption key (KEK).
Answers
C.
Use customer-supplied encryption keys to manage the data encryption key (DEK).
C.
Use customer-supplied encryption keys to manage the data encryption key (DEK).
Answers
D.
Use customer-supplied encryption keys to manage the key encryption key (KEK).
D.
Use customer-supplied encryption keys to manage the key encryption key (KEK).
Answers
Suggested answer: B

Explanation:

This PD and bucket data is encrypted using a Google-generated data encryption key (DEK) and key encryption key (KEK). The CMEK feature allows you to create, use, and revoke the key encryption key (KEK). Google still controls the data encryption key (DEK). For more information on Google data encryption keys, see Encryption at Rest. https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/customer-managed-encryption

https://codelabs.developers.google.com/codelabs/encrypt-and-decrypt-data-with-cloud-kms#0

You are a member of the security team at an organization. Your team has a single GCP project with credit card payment processing systems alongside web applications and data processing systems. You want to reduce the scope of systems subject to PCI audit standards.

What should you do?

A.
Use multi-factor authentication for admin access to the web application.
A.
Use multi-factor authentication for admin access to the web application.
Answers
B.
Use only applications certified compliant with PA-DSS.
B.
Use only applications certified compliant with PA-DSS.
Answers
C.
Move the cardholder data environment into a separate GCP project.
C.
Move the cardholder data environment into a separate GCP project.
Answers
D.
Use VPN for all connections between your office and cloud environments.
D.
Use VPN for all connections between your office and cloud environments.
Answers
Suggested answer: C

Explanation:

https://cloud.google.com/solutions/best-practices-vpc-design

'Setting up your payment-processing environment' section in https://cloud.google.com/solutions/pci-dss-compliance-in-gcp.

A retail customer allows users to upload comments and product reviews. The customer needs to make sure the text does not include sensitive data before the comments or reviews are published.

Which Google Cloud Service should be used to achieve this?

A.
Cloud Key Management Service
A.
Cloud Key Management Service
Answers
B.
Cloud Data Loss Prevention API
B.
Cloud Data Loss Prevention API
Answers
C.
BigQuery
C.
BigQuery
Answers
D.
Cloud Security Scanner
D.
Cloud Security Scanner
Answers
Suggested answer: B

A company allows every employee to use Google Cloud Platform. Each department has a Google Group, with all department members as group members. If a department member creates a new project, all members of that department should automatically have read-only access to all new project resources. Members of any other department should not have access to the project. You need to configure this behavior.

What should you do to meet these requirements?

A.
Create a Folder per department under the Organization. For each department's Folder, assign the Project Viewer role to the Google Group related to that department.
A.
Create a Folder per department under the Organization. For each department's Folder, assign the Project Viewer role to the Google Group related to that department.
Answers
B.
Create a Folder per department under the Organization. For each department's Folder, assign the Project Browser role to the Google Group related to that department.
B.
Create a Folder per department under the Organization. For each department's Folder, assign the Project Browser role to the Google Group related to that department.
Answers
C.
Create a Project per department under the Organization. For each department's Project, assign the Project Viewer role to the Google Group related to that department.
C.
Create a Project per department under the Organization. For each department's Project, assign the Project Viewer role to the Google Group related to that department.
Answers
D.
Create a Project per department under the Organization. For each department's Project, assign the Project Browser role to the Google Group related to that department.
D.
Create a Project per department under the Organization. For each department's Project, assign the Project Browser role to the Google Group related to that department.
Answers
Suggested answer: A

Explanation:

https://cloud.google.com/iam/docs/understanding-roles#project-roles

A customer's internal security team must manage its own encryption keys for encrypting data on Cloud Storage and decides to use customer-supplied encryption keys (CSEK).

How should the team complete this task?

A.
Upload the encryption key to a Cloud Storage bucket, and then upload the object to the same bucket.
A.
Upload the encryption key to a Cloud Storage bucket, and then upload the object to the same bucket.
Answers
B.
Use the gsutil command line tool to upload the object to Cloud Storage, and specify the location of the encryption key.
B.
Use the gsutil command line tool to upload the object to Cloud Storage, and specify the location of the encryption key.
Answers
C.
Generate an encryption key in the Google Cloud Platform Console, and upload an object to Cloud Storage using the specified key.
C.
Generate an encryption key in the Google Cloud Platform Console, and upload an object to Cloud Storage using the specified key.
Answers
D.
Encrypt the object, then use the gsutil command line tool or the Google Cloud Platform Console to upload the object to Cloud Storage.
D.
Encrypt the object, then use the gsutil command line tool or the Google Cloud Platform Console to upload the object to Cloud Storage.
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/storage/docs/encryption/customer-supplied-keys#gsutil

A customer has 300 engineers. The company wants to grant different levels of access and efficiently manage IAM permissions between users in the development and production environment projects.

Which two steps should the company take to meet these requirements? (Choose two.)

A.
Create a project with multiple VPC networks for each environment.
A.
Create a project with multiple VPC networks for each environment.
Answers
B.
Create a folder for each development and production environment.
B.
Create a folder for each development and production environment.
Answers
C.
Create a Google Group for the Engineering team, and assign permissions at the folder level.
C.
Create a Google Group for the Engineering team, and assign permissions at the folder level.
Answers
D.
Create an Organizational Policy constraint for each folder environment.
D.
Create an Organizational Policy constraint for each folder environment.
Answers
E.
Create projects for each environment, and grant IAM rights to each engineering user.
E.
Create projects for each environment, and grant IAM rights to each engineering user.
Answers
Suggested answer: B, C

You want to evaluate GCP for PCI compliance. You need to identify Google's inherent controls.

Which document should you review to find the information?

A.
Google Cloud Platform: Customer Responsibility Matrix
A.
Google Cloud Platform: Customer Responsibility Matrix
Answers
B.
PCI DSS Requirements and Security Assessment Procedures
B.
PCI DSS Requirements and Security Assessment Procedures
Answers
C.
PCI SSC Cloud Computing Guidelines
C.
PCI SSC Cloud Computing Guidelines
Answers
D.
Product documentation for Compute Engine
D.
Product documentation for Compute Engine
Answers
Suggested answer: A

Explanation:

https://cloud.google.com/files/PCI_DSS_Shared_Responsibility_GCP_v32.pdf

https://services.google.com/fh/files/misc/gcp_pci_shared_responsibility_matrix_aug_2021.pdf

Total 235 questions
Go to page: of 24