ExamGecko
Ask Question

Google Professional Cloud Security Engineer Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report
Export
Collapse

You are implementing data protection by design and in accordance with GDPR requirements. As part of design reviews, you are told that you need to manage the encryption key for a solution that includes workloads for Compute Engine, Google Kubernetes Engine, Cloud Storage, BigQuery, and Pub/Sub. Which option should you choose for this implementation?

Cloud External Key Manager
Cloud External Key Manager
Customer-managed encryption keys
Customer-managed encryption keys
Customer-supplied encryption keys
Customer-supplied encryption keys
Google default encryption
Google default encryption
Suggested answer: B

Explanation:

https://cloud.google.com/kms/docs/using-other-products#cmek_integrations https://cloud.google.com/kms/docs/using-other-products#cmek_integrations CMEK is supported for all the listed google services.

asked 18/09/2024
Marcel Engelbrecht
44 questions

Question 162

Report
Export
Collapse

Which Identity-Aware Proxy role should you grant to an Identity and Access Management (IAM) user to access HTTPS resources?

Security Reviewer
Security Reviewer
lAP-Secured Tunnel User
lAP-Secured Tunnel User
lAP-Secured Web App User
lAP-Secured Web App User
Service Broker Operator
Service Broker Operator
Suggested answer: C

Explanation:

IAP-Secured Tunnel User: Grants access to tunnel resources that use IAP. IAP-Secured Web App User: Access HTTPS resources which use Identity-Aware Proxy, Grants access to App Engine, Cloud Run, and Compute Engine resources.

https://cloud.google.com/iap/docs/managing-access#roles

asked 18/09/2024
mr yosh
37 questions

Question 163

Report
Export
Collapse

You need to audit the network segmentation for your Google Cloud footprint. You currently operate Production and Non-Production infrastructure-as-a-service (IaaS) environments. All your VM instances are deployed without any service account customization.

After observing the traffic in your custom network, you notice that all instances can communicate freely -- despite tag-based VPC firewall rules in place to segment traffic properly -- with a priority of 1000. What are the most likely reasons for this behavior?

All VM instances are missing the respective network tags.
All VM instances are missing the respective network tags.
All VM instances are residing in the same network subnet.
All VM instances are residing in the same network subnet.
All VM instances are configured with the same network route.
All VM instances are configured with the same network route.
A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 999.
A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 999.
A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 1001.
A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 1001.
Suggested answer: A, D
asked 18/09/2024
Rama Krishna
38 questions

Question 164

Report
Export
Collapse

You are creating a new infrastructure CI/CD pipeline to deploy hundreds of ephemeral projects in your Google Cloud organization to enable your users to interact with Google Cloud. You want to restrict the use of the default networks in your organization while following Google-recommended best practices. What should you do?

Enable the constraints/compute.skipDefaultNetworkCreation organization policy constraint at the organization level.
Enable the constraints/compute.skipDefaultNetworkCreation organization policy constraint at the organization level.
Create a cron job to trigger a daily Cloud Function to automatically delete all default networks for each project.
Create a cron job to trigger a daily Cloud Function to automatically delete all default networks for each project.
Grant your users the IAM Owner role at the organization level. Create a VPC Service Controls perimeter around the project that restricts the compute.googleapis.com API.
Grant your users the IAM Owner role at the organization level. Create a VPC Service Controls perimeter around the project that restricts the compute.googleapis.com API.
Only allow your users to use your CI/CD pipeline with a predefined set of infrastructure templates they can deploy to skip the creation of the default networks.
Only allow your users to use your CI/CD pipeline with a predefined set of infrastructure templates they can deploy to skip the creation of the default networks.
Suggested answer: A

Explanation:

Enable the constraints/compute.skipDefaultNetworkCreation organization policy constraint at the organization level.

https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - constraints/compute.skipDefaultNetworkCreation This boolean constraint skips the creation of the default network and related resources during Google Cloud Platform Project resource creation where this constraint is set to True. By default, a default network and supporting resources are automatically created when creating a Project resource.

asked 18/09/2024
giulio guzzi
38 questions

Question 165

Report
Export
Collapse

You are a security administrator at your company and are responsible for managing access controls (identification, authentication, and authorization) on Google Cloud. Which Google-recommended best practices should you follow when configuring authentication and authorization? (Choose two.)

Use Google default encryption.
Use Google default encryption.
Manually add users to Google Cloud.
Manually add users to Google Cloud.
Provision users with basic roles using Google's Identity and Access Management (IAM) service.
Provision users with basic roles using Google's Identity and Access Management (IAM) service.
Use SSO/SAML integration with Cloud Identity for user authentication and user lifecycle management.
Use SSO/SAML integration with Cloud Identity for user authentication and user lifecycle management.
Provide granular access with predefined roles.
Provide granular access with predefined roles.
Suggested answer: D, E

Explanation:

https://cloud.google.com/iam/docs/using-iam-securely#least_privilege Basic roles include thousands of permissions across all Google Cloud services. In production environments, do not grant basic roles unless there is no alternative. Instead, grant the most limited predefined roles or custom roles that meet your needs.

asked 18/09/2024
Carole Pie
40 questions

Question 166

Report
Export
Collapse

You have been tasked with inspecting IP packet data for invalid or malicious content. What should you do?

Use Packet Mirroring to mirror traffic to and from particular VM instances. Perform inspection using security software that analyzes the mirrored traffic.
Use Packet Mirroring to mirror traffic to and from particular VM instances. Perform inspection using security software that analyzes the mirrored traffic.
Enable VPC Flow Logs for all subnets in the VPC. Perform inspection on the Flow Logs data using Cloud Logging.
Enable VPC Flow Logs for all subnets in the VPC. Perform inspection on the Flow Logs data using Cloud Logging.
Configure the Fluentd agent on each VM Instance within the VPC. Perform inspection on the log data using Cloud Logging.
Configure the Fluentd agent on each VM Instance within the VPC. Perform inspection on the log data using Cloud Logging.
Configure Google Cloud Armor access logs to perform inspection on the log data.
Configure Google Cloud Armor access logs to perform inspection on the log data.
Suggested answer: A

Explanation:

https://cloud.google.com/vpc/docs/packet-mirroring

Packet Mirroring clones the traffic of specified instances in your Virtual Private Cloud (VPC) network and forwards it for examination. Packet Mirroring captures all traffic and packet data, including payloads and headers.

asked 18/09/2024
Pamela Joanne Ang
31 questions

Question 167

Report
Export
Collapse

You have the following resource hierarchy. There is an organization policy at each node in the hierarchy as shown. Which load balancer types are denied in VPC A?

Google Professional Cloud Security Engineer image Question 167 29449 09182024191401000000

All load balancer types are denied in accordance with the global node's policy.
All load balancer types are denied in accordance with the global node's policy.
INTERNAL_TCP_UDP, INTERNAL_HTTP_HTTPS is denied in accordance with the folder's policy.
INTERNAL_TCP_UDP, INTERNAL_HTTP_HTTPS is denied in accordance with the folder's policy.
EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY are denied in accordance with the project's policy.
EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY are denied in accordance with the project's policy.
EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY, INTERNAL_TCP_UDP, and INTERNAL_HTTP_HTTPS are denied in accordance with the folder and project's policies.
EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY, INTERNAL_TCP_UDP, and INTERNAL_HTTP_HTTPS are denied in accordance with the folder and project's policies.
Suggested answer: D
asked 18/09/2024
Hicham Kaoussi
28 questions

Question 168

Report
Export
Collapse

Your security team wants to implement a defense-in-depth approach to protect sensitive data stored in a Cloud Storage bucket. Your team has the following requirements:

The Cloud Storage bucket in Project A can only be readable from Project B.

The Cloud Storage bucket in Project A cannot be accessed from outside the network.

Data in the Cloud Storage bucket cannot be copied to an external Cloud Storage bucket.

What should the security team do?

Enable domain restricted sharing in an organization policy, and enable uniform bucket-level access on the Cloud Storage bucket.
Enable domain restricted sharing in an organization policy, and enable uniform bucket-level access on the Cloud Storage bucket.
Enable VPC Service Controls, create a perimeter around Projects A and B. and include the Cloud Storage API in the Service Perimeter configuration.
Enable VPC Service Controls, create a perimeter around Projects A and B. and include the Cloud Storage API in the Service Perimeter configuration.
Enable Private Access in both Project A and B's networks with strict firewall rules that allow communication between the networks.
Enable Private Access in both Project A and B's networks with strict firewall rules that allow communication between the networks.
Enable VPC Peering between Project A and B's networks with strict firewall rules that allow communication between the networks.
Enable VPC Peering between Project A and B's networks with strict firewall rules that allow communication between the networks.
Suggested answer: B

Explanation:

VPC Peering is between organizations not between Projects in an organization. That is Shared VPC. In this case, both projects are in same organization so having VPC Service Controls around both projects with necessary rules should be fine.

https://cloud.google.com/vpc-service-controls/docs/overview

asked 18/09/2024
Kameron Katoku
47 questions

Question 169

Report
Export
Collapse

You need to create a VPC that enables your security team to control network resources such as firewall rules. How should you configure the network to allow for separation of duties for network resources?

Set up multiple VPC networks, and set up multi-NIC virtual appliances to connect the networks.
Set up multiple VPC networks, and set up multi-NIC virtual appliances to connect the networks.
Set up VPC Network Peering, and allow developers to peer their network with a Shared VPC.
Set up VPC Network Peering, and allow developers to peer their network with a Shared VPC.
Set up a VPC in a project. Assign the Compute Network Admin role to the security team, and assign the Compute Admin role to the developers.
Set up a VPC in a project. Assign the Compute Network Admin role to the security team, and assign the Compute Admin role to the developers.
Set up a Shared VPC where the security team manages the firewall rules, and share the network with developers via service projects.
Set up a Shared VPC where the security team manages the firewall rules, and share the network with developers via service projects.
Suggested answer: D
asked 18/09/2024
Kingsley Tibs
43 questions

Question 170

Report
Export
Collapse

You are onboarding new users into Cloud Identity and discover that some users have created consumer user accounts using the corporate domain name. How should you manage these consumer user accounts with Cloud Identity?

Use Google Cloud Directory Sync to convert the unmanaged user accounts.
Use Google Cloud Directory Sync to convert the unmanaged user accounts.
Create a new managed user account for each consumer user account.
Create a new managed user account for each consumer user account.
Use the transfer tool for unmanaged user accounts.
Use the transfer tool for unmanaged user accounts.
Configure single sign-on using a customer's third-party provider.
Configure single sign-on using a customer's third-party provider.
Suggested answer: C

Explanation:

https://support.google.com/a/answer/6178640?hl=en

The transfer tool enables you to see what unmanaged users exist, and then invite those unmanaged users to the domain.

asked 18/09/2024
Frantisek Kohanyi Kohanyi
37 questions
Total 235 questions
Go to page: of 24
Search

Related questions