Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions
Questions # 41:

You are the security admin of your company. You have 3,000 objects in your Cloud Storage bucket. You do not want to manage access to each object individually. You also do not want the uploader of an object to always have full control of the object. However, you want to use Cloud Audit Logs to manage access to your bucket.

What should you do?

Options:

A.

Set up an ACL with OWNER permission to a scope of allUsers.


B.

Set up an ACL with READER permission to a scope of allUsers.


C.

Set up a default bucket ACL and manage access for users using IAM.


D.

Set up Uniform bucket-level access on the Cloud Storage bucket and manage access for users using IAM.


Expert Solution
Questions # 42:

You need to enable VPC Service Controls and allow changes to perimeters in existing environments without preventing access to resources. Which VPC Service Controls mode should you use?

Options:

A.

Cloud Run


B.

Native


C.

Enforced


D.

Dry run


Expert Solution
Questions # 43:

A batch job running on Compute Engine needs temporary write access to a Cloud Storage bucket. You want the batch job to use the minimum permissions necessary to complete the task. What should you do?

Options:

A.

Create a service account with full Cloud Storage administrator permissions. Assign the service account to the Compute Engine instance.


B.

Grant the predefined storage.objectcreator role to the Compute Engine instances default service account.


C.

Create a service account and embed a long-lived service account key file that has write permissions specified directly in the batch job

script.


D.

Create a service account with the storage .objectcreator role. Use service account impersonation in the batch job's code.


Expert Solution
Questions # 44:

You need to provide a corporate user account in Google Cloud for each of your developers and operational staff who need direct access to GCP resources. Corporate policy requires you to maintain the user identity in a third-party identity management provider and leverage single sign-on. You learn that a significant number of users are using their corporate domain email addresses for personal Google accounts, and you need to follow Google recommended practices to convert existing unmanaged users to managed accounts.

Which two actions should you take? (Choose two.)

Options:

A.

Use Google Cloud Directory Sync to synchronize your local identity management system to Cloud Identity.


B.

Use the Google Admin console to view which managed users are using a personal account for their recovery email.


C.

Add users to your managed Google account and force users to change the email addresses associated with their personal accounts.


D.

Use the Transfer Tool for Unmanaged Users (TTUU) to find users with conflicting accounts and ask them to transfer their personal Google accounts.


E.

Send an email to all of your employees and ask those users with corporate email addresses for personal Google accounts to delete the personal accounts immediately.


Expert Solution
Questions # 45:

Your privacy team uses crypto-shredding (deleting encryption keys) as a strategy to delete personally identifiable information (PII). You need to implement this practice on Google Cloud while still utilizing the majority of the platform’s services and minimizing operational overhead. What should you do?

Options:

A.

Use client-side encryption before sending data to Google Cloud, and delete encryption keys on-premises


B.

Use Cloud External Key Manager to delete specific encryption keys.


C.

Use customer-managed encryption keys to delete specific encryption keys.


D.

Use Google default encryption to delete specific encryption keys.


Expert Solution
Questions # 46:

You are a member of the security team at an organization. Your team has a single GCP project with credit card payment processing systems alongside web applications and data processing systems. You want to reduce the scope of systems subject to PCI audit standards.

What should you do?

Options:

A.

Use multi-factor authentication for admin access to the web application.


B.

Use only applications certified compliant with PA-DSS.


C.

Move the cardholder data environment into a separate GCP project.


D.

Use VPN for all connections between your office and cloud environments.


Expert Solution
Questions # 47:

You are asked to recommend a solution to store and retrieve sensitive configuration data from an application that runs on Compute Engine. Which option should you recommend?

Options:

A.

Cloud Key Management Service


B.

Compute Engine guest attributes


C.

Compute Engine custom metadata


D.

Secret Manager


Expert Solution
Questions # 48:

Your team needs to obtain a unified log view of all development cloud projects in your SIEM. The development projects are under the NONPROD organization folder with the test and pre-production projects. The development projects share the ABC-BILLING billing account with the rest of the organization.

Which logging export strategy should you use to meet the requirements?

Options:

A.

1. Export logs to a Cloud Pub/Sub topic with folders/NONPROD parent and includeChildren property set to True in a dedicated SIEM project.

2.Subscribe SIEM to the topic.


B.

1. Create a Cloud Storage sink with billingAccounts/ABC-BILLING parent and includeChildren property set to False in a dedicated SIEM project.

2.Process Cloud Storage objects in SIEM.


C.

1. Export logs in each dev project to a Cloud Pub/Sub topic in a dedicated SIEM project.

2.Subscribe SIEM to the topic.


D.

1. Create a Cloud Storage sink with a publicly shared Cloud Storage bucket in each project.

2.Process Cloud Storage objects in SIEM.


Expert Solution
Questions # 49:

A customer deployed an application on Compute Engine that takes advantage of the elastic nature of cloud computing.

How can you work with Infrastructure Operations Engineers to best ensure that Windows Compute Engine VMs are up to date with all the latest OS patches?

Options:

A.

Build new base images when patches are available, and use a CI/CD pipeline to rebuild VMs, deploying incrementally.


B.

Federate a Domain Controller into Compute Engine, and roll out weekly patches via Group Policy Object.


C.

Use Deployment Manager to provision updated VMs into new serving Instance Groups (IGs).


D.

Reboot all VMs during the weekly maintenance window and allow the StartUp Script to download the latest patches from the internet.


Expert Solution
Questions # 50:

Your organization is using Vertex AI Workbench Instances. You must ensure that newly deployed instances are automatically kept up-to-date and that users cannot accidentally alter settings in the operating system. What should you do?

Options:

A.

Enable the VM Manager and ensure the corresponding Google Compute Engine instances are added.


B.

Enforce the disableRootAccess and requireAutoUpgradeSchedule organization policies for newly deployed instances.


C.

Assign the AI Notebooks Runner and AI Notebooks Viewer roles to the users of the AI Workbench Instances.


D.

Implement a firewall rule that prevents Secure Shell access to the corresponding Google Compute Engine instances by using tags.


Expert Solution
Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions