Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

You are implementing a new web application on Google Cloud that will be accessed from your on-premises network. To provide protection from threats like malware, you must implement transport layer security (TLS) interception for incoming traffic to your application. What should you do?​

Options:

A.

Configure Secure Web Proxy. Offload the TLS traffic in the load balancer, inspect the traffic, and forward the traffic to the web application.​


B.

Configure an internal proxy load balancer. Offload the TLS traffic in the load balancer, inspect the traffic, and forward the traffic to the web application.​


C.

Configure a hierarchical firewall policy. Enable TLS interception by using Cloud Next Generation Firewall (NGFW) Enterprise.​


D.

Configure a VPC firewall rule. Enable TLS interception by using Cloud Next Generation Firewall (NGFW) Enterprise.​


Expert Solution
Questions # 12:

You are consulting with a client that requires end-to-end encryption of application data (including data in transit, data in use, and data at rest) within Google Cloud. Which options should you utilize to accomplish this? (Choose two.)

Options:

A.

External Key Manager


B.

Customer-supplied encryption keys


C.

Hardware Security Module


D.

Confidential Computing and Istio


E.

Client-side encryption


Expert Solution
Questions # 13:

Your organization operates in a highly regulated environment and has a stringent set of compliance requirements for protecting customer data. You must encrypt data while in use to meet regulations. What should you do?

Options:

A.

Use customer-managed encryption keys (CMEK) and Cloud KSM to enable your organization to control their keys for data encryption in Cloud SQL


B.

Enable the use of customer-supplied encryption keys (CSEK) keys in the Google Compute Engine VMs to give your organization maximum control over their VM disk encryption.


C.

Establish a trusted execution environment with a Confidential VM.


D.

Use a Shielded VM to ensure a secure boot with integrity monitoring for the application environment.


Expert Solution
Questions # 14:

In order to meet PCI DSS requirements, a customer wants to ensure that all outbound traffic is authorized.

Which two cloud offerings meet this requirement without additional compensating controls? (Choose two.)

Options:

A.

App Engine


B.

Cloud Functions


C.

Compute Engine


D.

Google Kubernetes Engine


E.

Cloud Storage


Expert Solution
Questions # 15:

Your company is deploying a new application on GKE. The application handles sensitive customer data and is subject to strict data residency requirements. You need to ensure that the data is stored only within the europe-west4 region. What should you do?

Options:

A.

Create a GKE cluster in europe-west4. Configure a network policy to block all traffic to and from other regions. Use Kubernetes role-based access control (RBAC) to limit access to the cluster.


B.

Train the development team on the data residency requirements, and use code reviews to ensure that all resources are deployed to europe-west4.


C.

Use an organizational policy to restrict resource locations to europe-west4 for the project containing the GKE cluster.


D.

Create a GKE cluster in europe-west4. Use a custom admission controller in GKE that validates the region of all deployed resources against a predefined allowed list.


Expert Solution
Questions # 16:

Your team needs to configure their Google Cloud Platform (GCP) environment so they can centralize the control over networking resources like firewall rules, subnets, and routes. They also have an on-premises environment where resources need access back to the GCP resources through a private VPN connection. The networking resources will need to be controlled by the network security team.

Which type of networking design should your team use to meet these requirements?

Options:

A.

Shared VPC Network with a host project and service projects


B.

Grant Compute Admin role to the networking team for each engineering project


C.

VPC peering between all engineering projects using a hub and spoke model


D.

Cloud VPN Gateway between all engineering projects using a hub and spoke model


Expert Solution
Questions # 17:

You manage your organization’s Security Operations Center (SOC). You currently monitor and detect network traffic anomalies in your VPCs based on network logs. However, you want to explore your environment using network payloads and headers. Which Google Cloud product should you use?

Options:

A.

Cloud IDS


B.

VPC Service Controls logs


C.

VPC Flow Logs


D.

Google Cloud Armor


E.

Packet Mirroring


Expert Solution
Questions # 18:

Which Google Cloud service should you use to enforce access control policies for applications and resources?

Options:

A.

Identity-Aware Proxy


B.

Cloud NAT


C.

Google Cloud Armor


D.

Shielded VMs


Expert Solution
Questions # 19:

You recently joined the networking team supporting your company's Google Cloud implementation. You are tasked with familiarizing yourself with the firewall rules configuration and providing recommendations based on your networking and Google Cloud experience. What product should you recommend to detect firewall rules that are overlapped by attributes from other firewall rules with higher or equal priority?

Options:

A.

Security Command Center


B.

Firewall Rules Logging


C.

VPC Flow Logs


D.

Firewall Insights


Expert Solution
Questions # 20:

Your organization is using Vertex AI Workbench Instances. You must ensure that newly deployed instances are automatically kept up-to-date and that users cannot accidentally alter settings in the operating system. What should you do?

Options:

A.

Enable the VM Manager and ensure the corresponding Google Compute Engine instances are added.


B.

Enforce the disableRootAccess and requireAutoUpgradeSchedule organization policies for newly deployed instances.


C.

Assign the AI Notebooks Runner and AI Notebooks Viewer roles to the users of the AI Workbench Instances.


D.

Implement a firewall rule that prevents Secure Shell access to the corresponding Google Compute Engine instances by using tags.


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions