Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

You work for an ecommerce company that stores sensitive customer data across multiple Google Cloud regions. The development team has built a new 3-tier application to process orders and must integrate the application into the production environment. You must design the network architecture to ensure strong security boundaries and isolation for the new application, facilitate secure remote maintenance by authorized third-party vendors, and follow the principle of least privilege. What should you do?

Options:

A.

Create separate VPC networks for each tier. Use VPC peering between application tiers and other required VPCs. Provide vendors with SSH keys and root access only to the instances within the VPC for maintenance purposes.


B.

Create a single VPC network and create different subnets for each tier. Create a new Google project specifically for the third-party vendors and grant the network admin role to the vendors. Deploy a VPN appliance and rely on the vendors' configurations to secure third-party access.


C.

Create separate VPC networks for each tier. Use VPC peering between application tiers and other required VPCs. Enable Identity-Aware Proxy (IAP) for remote access to management resources, limiting access to authorized vendors.


D.

Create a single VPC network and create different subnets for each tier. Create a new Google project specifically for the third-party vendors. Grant the vendors ownership of that project and the ability to modify the Shared VPC configuration.


Expert Solution
Questions # 62:

You have been tasked with configuring Security Command Center for your organization’s Google Cloud environment. Your security team needs to receive alerts of potential crypto mining in the organization’s compute environment and alerts for common Google Cloud misconfigurations that impact security. Which Security Command Center features should you use to configure these alerts? (Choose two.)

Options:

A.

Event Threat Detection


B.

Container Threat Detection


C.

Security Health Analytics


D.

Cloud Data Loss Prevention


E.

Google Cloud Armor


Expert Solution
Questions # 63:

You work for a financial organization in a highly regulated industry that is subject to active regulatory compliance. To meet compliance requirements, you need to continuously maintain a specific set of configurations, data residency, organizational policies, and personnel data access controls. What should you do?

Options:

A.

Create an Assured Workloads folder for your required compliance program to apply defined controls and requirements.


B.

Create a posture.yaml file with the required security compliance posture. Apply the posture with the gcloud sec postures create POSTURE_NAME --posture-from-file=posture.yaml command in Security Command Center Premium.


C.

Apply an organizational policy constraint at the organization level to limit the location of new resource creation.


D.

Go to the Compliance page in Security Command Center View the report for your status against the required compliance standard. Triage violations to maintain compliance on a regular basis.


Expert Solution
Questions # 64:

Your organization needs to restrict the types of Google Cloud services that can be deployed within specific folders to enforce compliance requirements. You must apply these restrictions only to the designated folders, without affecting other parts of the resource hierarchy. You want to use the most efficient and simple method. What should you do?

Options:

A.

Implement IAM conditions on service account creation within each folder.


B.

Create a global organization policy at the organization level with the Restrict Resource Service Usage constraint, and apply exceptions for other folders.


C.

Create an organization policy at the folder level using the Restrict Resource Service Usage constraint, and define the allowed services per folder.


D.

Configure VPC Service Controls perimeters around each folder, and define the allowed services within the perimeter.


Expert Solution
Questions # 65:

Your team wants to make sure Compute Engine instances running in your production project do not have public IP addresses. The frontend application Compute Engine instances will require public IPs. The product engineers have the Editor role to modify resources. Your team wants to enforce this requirement.

How should your team meet these requirements?

Options:

A.

Enable Private Access on the VPC network in the production project.


B.

Remove the Editor role and grant the Compute Admin IAM role to the engineers.


C.

Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.


D.

Set up a VPC network with two subnets: one with public IPs and one without public IPs.


Expert Solution
Questions # 66:

You are the security admin of your company. Your development team creates multiple GCP projects under the "implementation" folder for several dev, staging, and production workloads. You want to prevent data exfiltration by malicious insiders or compromised code by setting up a security perimeter. However, you do not want to restrict communication between the projects.

What should you do?

Options:

A.

Use a Shared VPC to enable communication between all projects, and use firewall rules to prevent data exfiltration.


B.

Create access levels in Access Context Manager to prevent data exfiltration, and use a shared VPC for communication between projects.


C.

Use an infrastructure-as-code software tool to set up a single service perimeter and to deploy a Cloud Function that monitors the "implementation" folder via Stackdriver and Cloud Pub/Sub. When the function notices that a new project is added to the folder, it executes Terraform to add the new project to the associated perimeter.


D.

Use an infrastructure-as-code software tool to set up three different service perimeters for dev, staging, and prod and to deploy a Cloud Function that monitors the "implementation" folder via Stackdriver and Cloud Pub/Sub. When the function notices that a new project is added to the folder, it executes Terraform to add the new project to the respective perimeter.


Expert Solution
Questions # 67:
Options:

A.

Configure IAM permissions on individual Model Garden to restrict access to specific models.


B.

Regularly audit user activity logs in Vertex AI to identify and revoke access to unapproved models.


C.

Train custom models within your Vertex AI project and restrict user access to these models.


D.

Implement an organization policy that restricts the vertexai.allowedModels constraint.


Expert Solution
Questions # 68:

You are in charge of creating a new Google Cloud organization for your company. Which two actions should you take when creating the super administrator accounts? (Choose two.)

Options:

A.

Create an access level in the Google Admin console to prevent super admin from logging in to Google Cloud.


B.

Disable any Identity and Access Management (1AM) roles for super admin at the organization level in the Google Cloud Console.


C.

Use a physical token to secure the super admin credentials with multi-factor authentication (MFA).


D.

Use a private connection to create the super admin accounts to avoid sending your credentials over the Internet.


E.

Provide non-privileged identities to the super admin users for their day-to-day activities.


Expert Solution
Questions # 69:

You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.

What should you do?

Options:

A.

Query Data Access logs.


B.

Query Admin Activity logs.


C.

Query Access Transparency logs.


D.

Query Stackdriver Monitoring Workspace.


Expert Solution
Questions # 70:

A customer has an analytics workload running on Compute Engine that should have limited internet access.

Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.

The Compute Engine instances now need to reach out to the public repository to get security updates. What should your team do?

Options:

A.

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority greater than 1000.


B.

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority less than 1000.


C.

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority greater than 1000.


D.

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority less than 1000.


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions