Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions
Questions # 51:

You are implementing a new web application on Google Cloud that will be accessed from your on-premises network. To provide protection from threats like malware, you must implement transport layer security (TLS) interception for incoming traffic to your application. What should you do?​

Options:

A.

Configure Secure Web Proxy. Offload the TLS traffic in the load balancer, inspect the traffic, and forward the traffic to the web application.​


B.

Configure an internal proxy load balancer. Offload the TLS traffic in the load balancer, inspect the traffic, and forward the traffic to the web application.​


C.

Configure a hierarchical firewall policy. Enable TLS interception by using Cloud Next Generation Firewall (NGFW) Enterprise.​


D.

Configure a VPC firewall rule. Enable TLS interception by using Cloud Next Generation Firewall (NGFW) Enterprise.​


Expert Solution
Questions # 52:

A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team wants to add a security layer so that the ERP systems only accept traffic from Cloud Identity- Aware Proxy.

What should the customer do to meet these requirements?

Options:

A.

Make sure that the ERP system can validate the JWT assertion in the HTTP requests.


B.

Make sure that the ERP system can validate the identity headers in the HTTP requests.


C.

Make sure that the ERP system can validate the x-forwarded-for headers in the HTTP requests.


D.

Make sure that the ERP system can validate the user’s unique identifier headers in the HTTP requests.


Expert Solution
Questions # 53:

An administrative application is running on a virtual machine (VM) in a managed group at port 5601 inside a Virtual Private Cloud (VPC) instance without access to the internet currently. You want to expose the web interface at port 5601 to users and enforce authentication and authorization Google credentials

What should you do?

Options:

A.

Modify the VPC routing with the default route point to the default internet gateway Modify the VPC Firewall rule to allow access from the internet 0.0.0.0/0 to port 5601 on the application instance.


B.

Configure the bastion host with OS Login enabled and allow connection to port 5601 at VPC firewall Log in to the bastion host from the Google Cloud console by using SSH-in-browser and then to the web application


C.

Configure an HTTP Load Balancing instance that points to the managed group with Identity-Aware Proxy (IAP) protection with Google credentials Modify the VPC firewall to allow access from IAP network range


D.

Configure Secure Shell Access (SSH) bastion host in a public network, and allow only the bastion host to connect to the application on port 5601. Use a bastion host as a jump host to connect to the application


Expert Solution
Questions # 54:

Your company plans to move most of its IT infrastructure to Google Cloud. They want to leverage their existing on-premises Active Directory as an identity provider for Google Cloud. Which two steps should you take to integrate the company’s on-premises Active Directory with Google Cloud and configure access management? (Choose two.)

Options:

A.

Use Identity Platform to provision users and groups to Google Cloud.


B.

Use Cloud Identity SAML integration to provision users and groups to Google Cloud.


C.

Install Google Cloud Directory Sync and connect it to Active Directory and Cloud Identity.


D.

Create Identity and Access Management (1AM) roles with permissions corresponding to each Active Directory group.


E.

Create Identity and Access Management (1AM) groups with permissions corresponding to each Active Directory group.


Expert Solution
Questions # 55:

You have created an OS image that is hardened per your organization’s security standards and is being stored in a project managed by the security team. As a Google Cloud administrator, you need to make sure all VMs in your Google Cloud organization can only use that specific OS image while minimizing operational overhead. What should you do? (Choose two.)

Options:

A.

Grant users the compuce.imageUser role in their own projects.


B.

Grant users the compuce.imageUser role in the OS image project.


C.

Store the image in every project that is spun up in your organization.


D.

Set up an image access organization policy constraint, and list the security team managed project in the projects allow list.


E.

Remove VM instance creation permission from users of the projects, and only allow you and your team to create VM instances.


Expert Solution
Questions # 56:

You are implementing data protection by design and in accordance with GDPR requirements. As part of design reviews, you are told that you need to manage the encryption key for a solution that includes workloads for Compute Engine, Google Kubernetes Engine, Cloud Storage, BigQuery, and Pub/Sub. Which option should you choose for this implementation?

Options:

A.

Cloud External Key Manager


B.

Customer-managed encryption keys


C.

Customer-supplied encryption keys


D.

Google default encryption


Expert Solution
Questions # 57:

Your organization strives to be a market leader in software innovation. You provided a large number of Google Cloud environments so developers can test the integration of Gemini in Vertex AI into their existing applications or create new projects. Your organization has 200 developers and a five-person security team. You must prevent and detect proper security policies across the Google Cloud environments. What should you do? (Choose 2 answers)​

Options:

A.

Apply a predefined AI-recommended security posture template for Gemini in Vertex AI in Security Command Center Enterprise or Premium tiers.​


B.

Publish internal policies and clear guidelines to securely develop applications.​


C.

Implement the least privileged access Identity and Access Management roles to prevent misconfigurations.​


D.

Apply organization policy constraints. Detect and monitor drifts by using Security Health Analytics.​


E.

Use Cloud Logging to create log filters to detect misconfigurations. Trigger Cloud Run functions to remediate misconfigurations.​


Expert Solution
Questions # 58:

You are backing up application logs to a shared Cloud Storage bucket that is accessible to both the administrator and analysts. Analysts should not have access to logs that contain any personally identifiable information (PII). Log files containing PII should be stored in another bucket that is only accessible to the administrator. What should you do?

Options:

A.

Upload the logs to both the shared bucket and the bucket with Pll that is only accessible to the administrator. Use the Cloud Data Loss Prevention API to create a job trigger. Configure the trigger to delete any files that contain Pll from the shared bucket.


B.

On the shared bucket, configure Object Lifecycle Management to delete objects that contain Pll.


C.

On the shared bucket, configure a Cloud Storage trigger that is only triggered when Pll is uploaded. Use Cloud Functions to capture the trigger and delete the files that contain Pll.


D.

Use Pub/Sub and Cloud Functions to trigger a Cloud Data Loss Prevention scan every time a file is uploaded to the administrator's bucket. If the scan does not detect Pll, have the function move the objects into the shared Cloud Storage bucket.


Expert Solution
Questions # 59:

Your company uses Google Cloud and has publicly exposed network assets. You want to discover the assets and perform a security audit on these assets by using a software tool in the least amount of time.

What should you do?

Options:

A.

Run a platform security scanner on all instances in the organization.


B.

Notify Google about the pending audit and wait for confirmation before performing the scan.


C.

Contact a Google approved security vendor to perform the audit.


D.

Identify all external assets by using Cloud Asset Inventory and then run a network security scanner against them.


Expert Solution
Questions # 60:

A company has redundant mail servers in different Google Cloud Platform regions and wants to route customers to the nearest mail server based on location.

How should the company accomplish this?

Options:

A.

Configure TCP Proxy Load Balancing as a global load balancing service listening on port 995.


B.

Create a Network Load Balancer to listen on TCP port 995 with a forwarding rule to forward traffic based

on location.


C.

Use Cross-Region Load Balancing with an HTTP(S) load balancer to route traffic to the nearest region.


D.

Use Cloud CDN to route the mail traffic to the closest origin mail server based on client IP address.


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions