New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are a security administrator at your company and are responsible for managing access controls (identification, authentication, and authorization) on Google Cloud. Which Google-recommended best practices should you follow when configuring authentication and authorization? (Choose two.)

Options:

A.

Use Google default encryption.


B.

Manually add users to Google Cloud.


C.

Provision users with basic roles using Google's Identity and Access Management (1AM) service.


D.

Use SSO/SAML integration with Cloud Identity for user authentication and user lifecycle management.


E.

Provide granular access with predefined roles.


Expert Solution
Questions # 22:

You are migrating an application into the cloud The application will need to read data from a Cloud Storage bucket. Due to local regulatory requirements, you need to hold the key material used for encryption fully under your control and you require a valid rationale for accessing the key material.

What should you do?

Options:

A.

Encrypt the data in the Cloud Storage bucket by using Customer Managed Encryption Keys. Configure an 1AM deny policy for unauthorized groups


B.

Encrypt the data in the Cloud Storage bucket by using Customer Managed Encryption Keys backed by a Cloud Hardware Security Module (HSM). Enable data access logs.


C.

Generate a key in your on-premises environment and store it in a Hardware Security Module (HSM) that is managed on-premises Use this key as an external key in the Cloud Key Management Service (KMS). Activate Key Access Justifications (KAJ) and set the external key system to reject unauthorized accesses.


D.

Generate a key in your on-premises environment to encrypt the data before you upload the data to the Cloud Storage bucket Upload the key to the Cloud Key Management Service (KMS). Activate Key Access Justifications (KAJ) and have the external key system reject unauthorized accesses.


Expert Solution
Questions # 23:

A customer has an analytics workload running on Compute Engine that should have limited internet access.

Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.

The Compute Engine instances now need to reach out to the public repository to get security updates. What should your team do?

Options:

A.

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority greater than 1000.


B.

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority less than 1000.


C.

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority greater than 1000.


D.

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority less than 1000.


Expert Solution
Questions # 24:

Your organization previously stored files in Cloud Storage by using Google Managed Encryption Keys (GMEK). but has recently updated the internal policy to require Customer Managed Encryption Keys (CMEK). You need to re-encrypt the files quickly and efficiently with minimal cost.

What should you do?

Options:

A.

Encrypt the files locally, and then use gsutil to upload the files to a new bucket.


B.

Copy the files to a new bucket with CMEK enabled in a secondary region


C.

Reupload the files to the same Cloud Storage bucket specifying a key file by using gsutil.


D.

Change the encryption type on the bucket to CMEK, and rewrite the objects


Expert Solution
Questions # 25:

Your company's Chief Information Security Officer (CISO) creates a requirement that business data must be stored in specific locations due to regulatory requirements that affect the company's global expansion plans. After working on the details to implement this requirement, you determine the following:

The services in scope are included in the Google Cloud Data Residency Terms.

The business data remains within specific locations under the same organization.

The folder structure can contain multiple data residency locations.

You plan to use the Resource Location Restriction organization policy constraint. At which level in the resource hierarchy should you set the constraint?

Options:

A.

Folder


B.

Resource


C.

Project


D.

Organization


Expert Solution
Questions # 26:

You plan to use a Google Cloud Armor policy to prevent common attacks such as cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for using Google Cloud Armor security policies? (Choose two.)

Options:

A.

The load balancer must be an external SSL proxy load balancer.


B.

Google Cloud Armor Policy rules can only match on Layer 7 (L7) attributes.


C.

The load balancer must use the Premium Network Service Tier.


D.

The backend service's load balancing scheme must be EXTERNAL.


E.

The load balancer must be an external HTTP(S) load balancer.


Expert Solution
Questions # 27:

Your organization uses the top-tier folder to separate application environments (prod and dev). The developers need to see all application development audit logs but they are not permitted to review production logs. Your security team can review all logs in production and development environments. You must grant Identity and Access Management (1AM) roles at the right resource level tor the developers and security team while you ensure least privilege.

What should you do?

Options:

A.

• 1 Grant logging, viewer rote to the security team at the organization resource level.• 2 Grant logging, viewer rote to the developer team at the folder resource level that contains all the dev projects.


B.

• 1 Grant logging. viewer rote to the security team at the organization resource level.• 2 Grant logging. admin role to the developer team at the organization resource level.


C.

• 1 Grant logging.admin role to the security team at the organization resource level.• 2 Grant logging. viewer rote to the developer team at the folder resource level that contains all the dev projects.


D.

• 1 Grant logging.admin role to the security team at the organization resource level.• 2 Grant logging.admin role to the developer team at the organization resource level.


Expert Solution
Questions # 28:

Your organization is using GitHub Actions as a continuous integration and delivery (Cl/CD) platform. You must enable access to Google Cloud resources from the Cl/CD pipelines in the most secure way.

What should you do?

Options:

A.

Create a service account key and add it to the GitHub pipeline configuration file.


B.

Create a service account key and add it to the GitHub repository content.


C.

Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.


D.

Configure workload identity federation to use GitHub as an identity pool provider.


Expert Solution
Questions # 29:

An organization’s typical network and security review consists of analyzing application transit routes, request handling, and firewall rules. They want to enable their developer teams to deploy new applications without the overhead of this full review.

How should you advise this organization?

Options:

A.

Use Forseti with Firewall filters to catch any unwanted configurations in production.


B.

Mandate use of infrastructure as code and provide static analysis in the CI/CD pipelines to enforce policies.


C.

Route all VPC traffic through customer-managed routers to detect malicious patterns in production.


D.

All production applications will run on-premises. Allow developers free rein in GCP as their dev and QA platforms.


Expert Solution
Questions # 30:

While migrating your organization’s infrastructure to GCP, a large number of users will need to access GCP Console. The Identity Management team already has a well-established way to manage your users and want to keep using your existing Active Directory or LDAP server along with the existing SSO password.

What should you do?

Options:

A.

Manually synchronize the data in Google domain with your existing Active Directory or LDAP server.


B.

Use Google Cloud Directory Sync to synchronize the data in Google domain with your existing Active Directory or LDAP server.


C.

Users sign in directly to the GCP Console using the credentials from your on-premises Kerberos compliant identity provider.


D.

Users sign in using OpenID (OIDC) compatible IdP, receive an authentication token, then use that token to log in to the GCP Console.


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions