ExamGecko
Home Home / Google / Professional Cloud Security Engineer

Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Your company runs a website that will store PII on Google Cloud Platform. To comply with data privacy regulations, this data can only be stored for a specific amount of time and must be fully deleted after this specific period. Data that has not yet reached the time period should not be deleted. You want to automate the process of complying with this regulation.

What should you do?

A.
Store the data in a single Persistent Disk, and delete the disk at expiration time.
A.
Store the data in a single Persistent Disk, and delete the disk at expiration time.
Answers
B.
Store the data in a single BigQuery table and set the appropriate table expiration time.
B.
Store the data in a single BigQuery table and set the appropriate table expiration time.
Answers
C.
Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.
C.
Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.
Answers
D.
Store the data in a single BigTable table and set an expiration time on the column families.
D.
Store the data in a single BigTable table and set an expiration time on the column families.
Answers
Suggested answer: C

Explanation:

'To support common use cases like setting a Time to Live (TTL) for objects, retaining noncurrent versions of objects, or 'downgrading' storage classes of objects to help manage costs, Cloud Storage offers the Object Lifecycle Management feature. This page describes the feature as well as the options available when using it. To learn how to enable Object Lifecycle Management, and for examples of lifecycle policies, see Managing Lifecycles.' https://cloud.google.com/storage/docs/lifecycle

A DevOps team will create a new container to run on Google Kubernetes Engine. As the application will be internet-facing, they want to minimize the attack surface of the container.

What should they do?

A.
Use Cloud Build to build the container images.
A.
Use Cloud Build to build the container images.
Answers
B.
Build small containers using small base images.
B.
Build small containers using small base images.
Answers
C.
Delete non-used versions from Container Registry.
C.
Delete non-used versions from Container Registry.
Answers
D.
Use a Continuous Delivery tool to deploy the application.
D.
Use a Continuous Delivery tool to deploy the application.
Answers
Suggested answer: B

Explanation:

Small containers usually have a smaller attack surface as compared to containers that use large base images. https://cloud.google.com/blog/products/gcp/kubernetes-best-practices-how-and-why-to-build-small-container-images

While migrating your organization's infrastructure to GCP, a large number of users will need to access GCP Console. The Identity Management team already has a well-established way to manage your users and want to keep using your existing Active Directory or LDAP server along with the existing SSO password.

What should you do?

A.
Manually synchronize the data in Google domain with your existing Active Directory or LDAP server.
A.
Manually synchronize the data in Google domain with your existing Active Directory or LDAP server.
Answers
B.
Use Google Cloud Directory Sync to synchronize the data in Google domain with your existing Active Directory or LDAP server.
B.
Use Google Cloud Directory Sync to synchronize the data in Google domain with your existing Active Directory or LDAP server.
Answers
C.
Users sign in directly to the GCP Console using the credentials from your on-premises Kerberos compliant identity provider.
C.
Users sign in directly to the GCP Console using the credentials from your on-premises Kerberos compliant identity provider.
Answers
D.
Users sign in using OpenID (OIDC) compatible IdP, receive an authentication token, then use that token to log in to the GCP Console.
D.
Users sign in using OpenID (OIDC) compatible IdP, receive an authentication token, then use that token to log in to the GCP Console.
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/architecture/identity/federating-gcp-with-active-directory-configuring-single-sign-on

Your company is using GSuite and has developed an application meant for internal usage on Google App Engine. You need to make sure that an external user cannot gain access to the application even when an employee's password has been compromised.

What should you do?

A.
Enforce 2-factor authentication in GSuite for all users.
A.
Enforce 2-factor authentication in GSuite for all users.
Answers
B.
Configure Cloud Identity-Aware Proxy for the App Engine Application.
B.
Configure Cloud Identity-Aware Proxy for the App Engine Application.
Answers
C.
Provision user passwords using GSuite Password Sync.
C.
Provision user passwords using GSuite Password Sync.
Answers
D.
Configure Cloud VPN between your private network and GCP.
D.
Configure Cloud VPN between your private network and GCP.
Answers
Suggested answer: A

Explanation:

https://docs.google.com/document/d/11o3e14tyhnT7w45Q8-r9ZmTAfj2WUNUpJPZImrxm_F4/edit?usp=sharing

https://support.google.com/a/answer/175197?hl=en

A large financial institution is moving its Big Data analytics to Google Cloud Platform. They want to have maximum control over the encryption process of data stored at rest in BigQuery.

What technique should the institution use?

A.
Use Cloud Storage as a federated Data Source.
A.
Use Cloud Storage as a federated Data Source.
Answers
B.
Use a Cloud Hardware Security Module (Cloud HSM).
B.
Use a Cloud Hardware Security Module (Cloud HSM).
Answers
C.
Customer-managed encryption keys (CMEK).
C.
Customer-managed encryption keys (CMEK).
Answers
D.
Customer-supplied encryption keys (CSEK).
D.
Customer-supplied encryption keys (CSEK).
Answers
Suggested answer: C

Explanation:

If you want to manage the key encryption keys used for your data at rest, instead of having Google manage the keys, use Cloud Key Management Service to manage your keys. This scenario is known as customer-managed encryption keys (CMEK). https://cloud.google.com/bigquery/docs/encryption-at-rest

A company is deploying their application on Google Cloud Platform. Company policy requires long-term data to be stored using a solution that can automatically replicate data over at least two geographic places.

Which Storage solution are they allowed to use?

A.
Cloud Bigtable
A.
Cloud Bigtable
Answers
B.
Cloud BigQuery
B.
Cloud BigQuery
Answers
C.
Compute Engine SSD Disk
C.
Compute Engine SSD Disk
Answers
D.
Compute Engine Persistent Disk
D.
Compute Engine Persistent Disk
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/bigquery#:~:text=BigQuery%20transparently%20and%20automatically%20provides,charge%20and%20no%20additional%20setup.&text=BigQuery%20also%20provides%20ODBC%20and,interact%20with%20its%20powerful%20engine.

A large e-retailer is moving to Google Cloud Platform with its ecommerce website. The company wants to ensure payment information is encrypted between the customer's browser and GCP when the customers checkout online.

What should they do?

A.
Configure an SSL Certificate on an L7 Load Balancer and require encryption.
A.
Configure an SSL Certificate on an L7 Load Balancer and require encryption.
Answers
B.
Configure an SSL Certificate on a Network TCP Load Balancer and require encryption.
B.
Configure an SSL Certificate on a Network TCP Load Balancer and require encryption.
Answers
C.
Configure the firewall to allow inbound traffic on port 443, and block all other inbound traffic.
C.
Configure the firewall to allow inbound traffic on port 443, and block all other inbound traffic.
Answers
D.
Configure the firewall to allow outbound traffic on port 443, and block all other outbound traffic.
D.
Configure the firewall to allow outbound traffic on port 443, and block all other outbound traffic.
Answers
Suggested answer: A

Explanation:

https://cloud.google.com/load-balancing/docs/load-balancing-overview#external_versus_internal_load_balancing

Applications often require access to ''secrets'' - small pieces of sensitive data at build or run time. The administrator managing these secrets on GCP wants to keep a track of ''who did what, where, and when?'' within their GCP projects.

Which two log streams would provide the information that the administrator is looking for? (Choose two.)

A.
Admin Activity logs
A.
Admin Activity logs
Answers
B.
System Event logs
B.
System Event logs
Answers
C.
Data Access logs
C.
Data Access logs
Answers
D.
VPC Flow logs
D.
VPC Flow logs
Answers
E.
Agent logs
E.
Agent logs
Answers
Suggested answer: A, C

Explanation:

https://cloud.google.com/secret-manager/docs/audit-logging

You are in charge of migrating a legacy application from your company datacenters to GCP before the current maintenance contract expires. You do not know what ports the application is using and no documentation is available for you to check. You want to complete the migration without putting your environment at risk.

What should you do?

A.
Migrate the application into an isolated project using a ''Lift & Shift'' approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
A.
Migrate the application into an isolated project using a ''Lift & Shift'' approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
Answers
B.
Migrate the application into an isolated project using a ''Lift & Shift'' approach in a custom network. Disable all traffic within the VPC and look at the Firewall logs to determine what traffic should be allowed for the application to work properly.
B.
Migrate the application into an isolated project using a ''Lift & Shift'' approach in a custom network. Disable all traffic within the VPC and look at the Firewall logs to determine what traffic should be allowed for the application to work properly.
Answers
C.
Refactor the application into a micro-services architecture in a GKE cluster. Disable all traffic from outside the cluster using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
C.
Refactor the application into a micro-services architecture in a GKE cluster. Disable all traffic from outside the cluster using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
Answers
D.
Refactor the application into a micro-services architecture hosted in Cloud Functions in an isolated project. Disable all traffic from outside your project using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
D.
Refactor the application into a micro-services architecture hosted in Cloud Functions in an isolated project. Disable all traffic from outside your project using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
Answers
Suggested answer: A

Explanation:

Migrate the application into an isolated project using a 'Lift & Shift' approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.

Your company has deployed an application on Compute Engine. The application is accessible by clients on port 587. You need to balance the load between the different instances running the application. The connection should be secured using TLS, and terminated by the Load Balancer.

What type of Load Balancing should you use?

A.
Network Load Balancing
A.
Network Load Balancing
Answers
B.
HTTP(S) Load Balancing
B.
HTTP(S) Load Balancing
Answers
C.
TCP Proxy Load Balancing
C.
TCP Proxy Load Balancing
Answers
D.
SSL Proxy Load Balancing
D.
SSL Proxy Load Balancing
Answers
Suggested answer: D

Explanation:

https://cloud.google.com/load-balancing/docs/ssl - SSL Proxy Load Balancing is a reverse proxy load balancer that distributes SSL traffic coming from the internet to virtual machine (VM) instances in your Google Cloud VPC network.

Total 235 questions
Go to page: of 24