Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 3 out of 8 pages
Viewing questions 21-30 out of questions
Questions # 21:

Your organization is deploying a serverless web application on Cloud Run that must be publicly accessible over HTTPS. To meet security requirements, you need to terminate TLS at the edge, apply threat mitigation, and prepare for geo-based access restrictions. What should you do?

Options:

A.

Make the Cloud Run service public by enabling allUsers access. Configure Identity-Aware Proxy (IAP) for authentication and IP-based access control. Use custom SSL certificates for HTTPS.


B.

Assign a custom domain to the Cloud Run service. Enable HTTPS. Configure IAM to allow allUsers to invoke the service. Use firewall rules and VPC Service Controls for geo-based restriction and traffic filtering.


C.

Deploy an external HTTP(S) load balancer with a serverless NEG that points to the Cloud Run service. Use a Google-managed certificate for TLS termination. Configure a Cloud Armor policy with geo-based access control.


D.

Create a Cloud DNS public zone for the Cloud Run URL. Bind a static IP to the service. Use VPC firewall rules to restrict incoming traffic based on IP ranges and threat signatures.


Expert Solution
Questions # 22:

You need to enforce a security policy in your Google Cloud organization that prevents users from exposing objects in their buckets externally. There are currently no buckets in your organization. Which solution should you implement proactively to achieve this goal with the least operational overhead?

Options:

A.

Create an hourly cron job to run a Cloud Function that finds public buckets and makes them private.


B.

Enable the constraints/storage.publicAccessPrevention constraint at the organization level.


C.

Enable the constraints/storage.uniformBucketLevelAccess constraint at the organization level.


D.

Create a VPC Service Controls perimeter that protects the storage.googleapis.com service in your projects that contains buckets. Add any new project that contains a bucket to the perimeter.


Expert Solution
Questions # 23:

You are exporting application logs to Cloud Storage. You encounter an error message that the log sinks don't support uniform bucket-level access policies. How should you resolve this error?

Options:

A.

Change the access control model for the bucket


B.

Update your sink with the correct bucket destination.


C.

Add the roles/logging.logWriter Identity and Access Management (IAM) role to the bucket for the log sink identity.


D.

Add the roles/logging.bucketWriter Identity and Access Management (IAM) role to the bucket for the log sink identity.


Expert Solution
Questions # 24:

You are onboarding new users into Cloud Identity and discover that some users have created consumer user accounts using the corporate domain name. How should you manage these consumer user accounts with Cloud Identity?

Options:

A.

Use Google Cloud Directory Sync to convert the unmanaged user accounts.


B.

Create a new managed user account for each consumer user account.


C.

Use the transfer tool for unmanaged user accounts.


D.

Configure single sign-on using a customer's third-party provider.


Expert Solution
Questions # 25:

You plan to use a Google Cloud Armor policy to prevent common attacks such as cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for using Google Cloud Armor security policies? (Choose two.)

Options:

A.

The load balancer must be an external SSL proxy load balancer.


B.

Google Cloud Armor Policy rules can only match on Layer 7 (L7) attributes.


C.

The load balancer must use the Premium Network Service Tier.


D.

The backend service's load balancing scheme must be EXTERNAL.


E.

The load balancer must be an external HTTP(S) load balancer.


Expert Solution
Questions # 26:

Your organization previously stored files in Cloud Storage by using Google Managed Encryption Keys (GMEK). but has recently updated the internal policy to require Customer Managed Encryption Keys (CMEK). You need to re-encrypt the files quickly and efficiently with minimal cost.

What should you do?

Options:

A.

Encrypt the files locally, and then use gsutil to upload the files to a new bucket.


B.

Copy the files to a new bucket with CMEK enabled in a secondary region


C.

Reupload the files to the same Cloud Storage bucket specifying a key file by using gsutil.


D.

Change the encryption type on the bucket to CMEK, and rewrite the objects


Expert Solution
Questions # 27:

You have been tasked with configuring Security Command Center for your organization’s Google Cloud environment. Your security team needs to receive alerts of potential crypto mining in the organization’s compute environment and alerts for common Google Cloud misconfigurations that impact security. Which Security Command Center features should you use to configure these alerts? (Choose two.)

Options:

A.

Event Threat Detection


B.

Container Threat Detection


C.

Security Health Analytics


D.

Cloud Data Loss Prevention


E.

Google Cloud Armor


Expert Solution
Questions # 28:

You discovered that sensitive personally identifiable information (PII) is being ingested to your Google Cloud environment in the daily ETL process from an on-premises environment to your BigQuery datasets. You need to redact this data to obfuscate the PII, but need to re-identify it for data analytics purposes. Which components should you use in your solution? (Choose two.)

Options:

A.

Secret Manager


B.

Cloud Key Management Service


C.

Cloud Data Loss Prevention with cryptographic hashing


D.

Cloud Data Loss Prevention with automatic text redaction


E.

Cloud Data Loss Prevention with deterministic encryption using AES-SIV


Expert Solution
Questions # 29:

You run applications on Cloud Run. You already enabled container analysis for vulnerability scanning. However, you are concerned about the lack of control on the applications that are deployed. You must ensure that only trusted container images are deployed on Cloud Run.

What should you do?

Choose 2 answers

Options:

A.

Enable Binary Authorization on the existing Kubernetes cluster.


B.

Set the organization policy constraint constraints/run. allowedBinaryAuthorizationPolicie to

the list of allowed Binary Authorization policy names.


C.

Set the organization policy constraint constraints/compute.trustedimageProjects to the list of

protects that contain the trusted container images.


D.

Enable Binary Authorization on the existing Cloud Run service.


E.

Use Cloud Run breakglass to deploy an image that meets the Binary Authorization policy by default.


Expert Solution
Questions # 30:

Which two implied firewall rules are defined on a VPC network? (Choose two.)

Options:

A.

A rule that allows all outbound connections


B.

A rule that denies all inbound connections


C.

A rule that blocks all inbound port 25 connections


D.

A rule that blocks all outbound connections


E.

A rule that allows all inbound port 80 connections


Expert Solution
Viewing page 3 out of 8 pages
Viewing questions 21-30 out of questions