Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 9
List of questions
Question 81
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A customer is running an analytics workload on Google Cloud Platform (GCP) where Compute Engine instances are accessing data stored on Cloud Storage. Your team wants to make sure that this workload will not be able to access, or be accessed from, the internet.
Which two strategies should your team use to meet these requirements? (Choose two.)
Question 82
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A customer wants to run a batch processing system on VMs and store the output files in a Cloud Storage bucket. The networking and security teams have decided that no VMs may reach the public internet.
How should this be accomplished?
Explanation:
https://cloud.google.com/vpc/docs/private-google-access
Question 83
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
As adoption of the Cloud Data Loss Prevention (DLP) API grows within the company, you need to optimize usage to reduce cost. DLP target data is stored in Cloud Storage and BigQuery. The location and region are identified as a suffix in the resource name.
Which cost reduction options should you recommend?
Explanation:
https://cloud.google.com/dlp/docs/inspecting-storage#sampling https://cloud.google.com/dlp/docs/best-practices-costs#limit_scans_of_files_in_to_only_relevant_files
Question 84
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Your team uses a service account to authenticate data transfers from a given Compute Engine virtual machine instance of to a specified Cloud Storage bucket. An engineer accidentally deletes the service account, which breaks application functionality. You want to recover the application as quickly as possible without compromising security.
What should you do?
Explanation:
https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts/undelete
Question 85
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You are the Security Admin in your company. You want to synchronize all security groups that have an email address from your LDAP directory in Cloud IAM.
What should you do?
Explanation:
search rules that have 'user email address' as the attribute to facilitate one-way sync. Reference Links: https://support.google.com/a/answer/6126589?hl=en
Question 86
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.
What should you do?
Explanation:
Admin activity logs are always created to log entries for API calls or other actions that modify the configuration or metadata of resources. For example, these logs record when users create VM instances or change Identity and Access Management permissions.
Question 87
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You have an application where the frontend is deployed on a managed instance group in subnet A and the data layer is stored on a mysql Compute Engine virtual machine (VM) in subnet B on the same VPC. Subnet A and Subnet B hold several other Compute Engine VMs. You only want to allow thee application frontend to access the data in the application's mysql instance on port 3306.
What should you do?
Explanation:
https://cloud.google.com/sql/docs/mysql/sql-proxy#using-a-service-account
Question 88
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Your company operates an application instance group that is currently deployed behind a Google Cloud load balancer in us-central-1 and is configured to use the Standard Tier network. The infrastructure team wants to expand to a second Google Cloud region, us-east-2. You need to set up a single external IP address to distribute new requests to the instance groups in both regions.
What should you do?
Explanation:
https://cloud.google.com/load-balancing/docs/choosing-load-balancer#global-regional
Question 89
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You are the security admin of your company. You have 3,000 objects in your Cloud Storage bucket. You do not want to manage access to each object individually. You also do not want the uploader of an object to always have full control of the object. However, you want to use Cloud Audit Logs to manage access to your bucket.
What should you do?
Explanation:
https://cloud.google.com/storage/docs/uniform-bucket-level-access#enabled
Question 90
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You are the security admin of your company. Your development team creates multiple GCP projects under the 'implementation' folder for several dev, staging, and production workloads. You want to prevent data exfiltration by malicious insiders or compromised code by setting up a security perimeter. However, you do not want to restrict communication between the projects.
What should you do?
Explanation:
https://cloud.google.com/vpc-service-controls/docs/overview#benefits
https://github.com/terraform-google-modules/terraform-google-vpc-service-controls/tree/master/examples/automatic_folder
Question