Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Your organization is using GitHub Actions as a continuous integration and delivery (Cl/CD) platform. You must enable access to Google Cloud resources from the Cl/CD pipelines in the most secure way.

What should you do?

Options:

A.

Create a service account key and add it to the GitHub pipeline configuration file.


B.

Create a service account key and add it to the GitHub repository content.


C.

Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.


D.

Configure workload identity federation to use GitHub as an identity pool provider.


Expert Solution
Questions # 42:

You are part of a security team that wants to ensure that a Cloud Storage bucket in Project A can only be readable from Project B. You also want to ensure that data in the Cloud Storage bucket cannot be accessed from or copied to Cloud Storage buckets outside the network, even if the user has the correct credentials.

What should you do?

Options:

A.

Enable VPC Service Controls, create a perimeter with Project A and B, and include Cloud Storage service.


B.

Enable Domain Restricted Sharing Organization Policy and Bucket Policy Only on the Cloud Storage bucket.


C.

Enable Private Access in Project A and B networks with strict firewall rules to allow communication between the networks.


D.

Enable VPC Peering between Project A and B networks with strict firewall rules to allow communication between the networks.


Expert Solution
Questions # 43:

You need to provide a corporate user account in Google Cloud for each of your developers and operational staff who need direct access to GCP resources. Corporate policy requires you to maintain the user identity in a third-party identity management provider and leverage single sign-on. You learn that a significant number of users are using their corporate domain email addresses for personal Google accounts, and you need to follow Google recommended practices to convert existing unmanaged users to managed accounts.

Which two actions should you take? (Choose two.)

Options:

A.

Use Google Cloud Directory Sync to synchronize your local identity management system to Cloud Identity.


B.

Use the Google Admin console to view which managed users are using a personal account for their recovery email.


C.

Add users to your managed Google account and force users to change the email addresses associated with their personal accounts.


D.

Use the Transfer Tool for Unmanaged Users (TTUU) to find users with conflicting accounts and ask them to transfer their personal Google accounts.


E.

Send an email to all of your employees and ask those users with corporate email addresses for personal Google accounts to delete the personal accounts immediately.


Expert Solution
Questions # 44:
Options:

A.

Do not use Vertex AI for sensitive data. Use only public data with minimal privacy requirements.


B.

Contact Google support to opt out of model tuning.


C.

Do nothing. Vertex AI foundation models are frozen by default and do not use your data for model-tuning purposes.


D.

Encrypt your data by using customer-managed encryption keys (CMEK) to have full control over encryption key access.


Expert Solution
Questions # 45:

Your organization has Google Cloud applications that require access to external web services. You must monitor, control, and log access to these services. What should you do?

Options:

A.

Configure VPC firewall rules to allow the services to access the IP addresses of required external web services.


B.

Set up a Secure Web Proxy that allows access to the specific external web services. Configure applications to use the proxy for the web service requests.


C.

Configure Google Cloud Armor to monitor and protect your applications by checking incoming traffic patterns for attack patterns.


D.

Set up a Cloud NAT instance to allow egress traffic from your VPC.


Expert Solution
Questions # 46:

In a shared security responsibility model for IaaS, which two layers of the stack does the customer share responsibility for? (Choose two.)

Options:

A.

Hardware


B.

Network Security


C.

Storage Encryption


D.

Access Policies


E.

Boot


Expert Solution
Questions # 47:

You need to create a VPC that enables your security team to control network resources such as firewall rules. How should you configure the network to allow for separation of duties for network resources?

Options:

A.

Set up multiple VPC networks, and set up multi-NIC virtual appliances to connect the networks.


B.

Set up VPC Network Peering, and allow developers to peer their network with a Shared VPC.


C.

Set up a VPC in a project. Assign the Compute Network Admin role to the security team, and assign the Compute Admin role to the developers.


D.

Set up a Shared VPC where the security team manages the firewall rules, and share the network with developers via service projects.


Expert Solution
Questions # 48:

You are backing up application logs to a shared Cloud Storage bucket that is accessible to both the administrator and analysts. Analysts should not have access to logs that contain any personally identifiable information (PII). Log files containing PII should be stored in another bucket that is only accessible to the administrator. What should you do?

Options:

A.

Upload the logs to both the shared bucket and the bucket with Pll that is only accessible to the administrator. Use the Cloud Data Loss Prevention API to create a job trigger. Configure the trigger to delete any files that contain Pll from the shared bucket.


B.

On the shared bucket, configure Object Lifecycle Management to delete objects that contain Pll.


C.

On the shared bucket, configure a Cloud Storage trigger that is only triggered when Pll is uploaded. Use Cloud Functions to capture the trigger and delete the files that contain Pll.


D.

Use Pub/Sub and Cloud Functions to trigger a Cloud Data Loss Prevention scan every time a file is uploaded to the administrator's bucket. If the scan does not detect Pll, have the function move the objects into the shared Cloud Storage bucket.


Expert Solution
Questions # 49:

A batch job running on Compute Engine needs temporary write access to a Cloud Storage bucket. You want the batch job to use the minimum permissions necessary to complete the task. What should you do?

Options:

A.

Create a service account with full Cloud Storage administrator permissions. Assign the service account to the Compute Engine instance.


B.

Grant the predefined storage.objectcreator role to the Compute Engine instances default service account.


C.

Create a service account and embed a long-lived service account key file that has write permissions specified directly in the batch jobscript.


D.

Create a service account with the storage .objectcreator role. Use service account impersonation in the batch job's code.


Expert Solution
Questions # 50:

Your company’s new CEO recently sold two of the company’s divisions. Your Director asks you to help migrate the Google Cloud projects associated with those divisions to a new organization node. Which preparation steps are necessary before this migration occurs? (Choose two.)

Options:

A.

Remove all project-level custom Identity and Access Management (1AM) roles.


B.

Disallow inheritance of organization policies.


C.

Identify inherited Identity and Access Management (1AM) roles on projects to be migrated.


D.

Create a new folder for all projects to be migrated.


E.

Remove the specific migration projects from any VPC Service Controls perimeters and bridges.


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions