Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

An organization is starting to move its infrastructure from its on-premises environment to Google Cloud Platform (GCP). The first step the organization wants to take is to migrate its ongoing data backup and disaster recovery solutions to GCP. The organization's on-premises production environment is going to be the next phase for migration to GCP. Stable networking connectivity between the on-premises environment and GCP is also being implemented.

Which GCP solution should the organization use?

Options:

A.

BigQuery using a data pipeline job with continuous updates via Cloud VPN


B.

Cloud Storage using a scheduled task and gsutil via Cloud Interconnect


C.

Compute Engines Virtual Machines using Persistent Disk via Cloud Interconnect


D.

Cloud Datastore using regularly scheduled batch upload jobs via Cloud VPN


Expert Solution
Questions # 62:

Your organization is moving virtual machines (VMs) to Google Cloud. You must ensure that operating system images that are used across your projects are trusted and meet your security requirements.

What should you do?

Options:

A.

Implement an organization policy to enforce that boot disks can only be created from images that come from the trusted image project.


B.

Create a Cloud Function that is automatically triggered when a new virtual machine is created from the trusted image repository Verify that the image is not deprecated.


C.

Implement an organization policy constraint that enables the Shielded VM service on all projects to enforce the trusted image repository usage.


D.

Automate a security scanner that verifies that no common vulnerabilities and exposures (CVEs) are present in your trusted image repository.


Expert Solution
Questions # 63:

Your Google Cloud organization allows for administrative capabilities to be distributed to each team through provision of a Google Cloud project with Owner role (roles/ owner). The organization contains thousands of Google Cloud Projects Security Command Center Premium has surfaced multiple cpen_myscl_port findings. You are enforcing the guardrails and need to prevent these types of common misconfigurations.

What should you do?

Options:

A.

Create a firewall rule for each virtual private cloud (VPC) to deny traffic from 0 0 0 0/0 with priority 0.


B.

Create a hierarchical firewall policy configured at the organization to deny all connections from 0 0 0 0/0.


C.

Create a Google Cloud Armor security policy to deny traffic from 0 0 0 0/0.


D.

Create a hierarchical firewall policy configured at the organization to allow connections only from internal IP ranges


Expert Solution
Questions # 64:

Your organization deploys a large number of containerized applications on Google Kubernetes Engine (GKE). Node updates are currently applied manually. Audit findings show that a critical patch has not been installed due to a missed notification. You need to design a more reliable, cloud-first, and scalable process for node updates. What should you do?​

Options:

A.

Migrate the cluster infrastructure to a self-managed Kubernetes environment for greater control over the patching process.​


B.

Develop a custom script to continuously check for patch availability, download patches, and apply the patches across all components of the cluster.​


C.

Schedule a daily reboot for all nodes to automatically upgrade.​


D.

Configure node auto-upgrades for node pools in the maintenance windows.​


Expert Solution
Questions # 65:

Your security team wants to implement a defense-in-depth approach to protect sensitive data stored in a Cloud Storage bucket. Your team has the following requirements:

    The Cloud Storage bucket in Project A can only be readable from Project B.

    The Cloud Storage bucket in Project A cannot be accessed from outside the network.

    Data in the Cloud Storage bucket cannot be copied to an external Cloud Storage bucket.

What should the security team do?

Options:

A.

Enable domain restricted sharing in an organization policy, and enable uniform bucket-level access on the Cloud Storage bucket.


B.

Enable VPC Service Controls, create a perimeter around Projects A and B. and include the Cloud Storage API in the Service Perimeter configuration.


C.

Enable Private Access in both Project A and B's networks with strict firewall rules that allow communication between the networks.


D.

Enable VPC Peering between Project A and B's networks with strict firewall rules that allow communication between the networks.


Expert Solution
Questions # 66:

Your company runs a website that will store PII on Google Cloud Platform. To comply with data privacy regulations, this data can only be stored for a specific amount of time and must be fully deleted after this specific period. Data that has not yet reached the time period should not be deleted. You want to automate the process of complying with this regulation.

What should you do?

Options:

A.

Store the data in a single Persistent Disk, and delete the disk at expiration time.


B.

Store the data in a single BigQuery table and set the appropriate table expiration time.


C.

Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.


D.

Store the data in a single BigTable table and set an expiration time on the column families.


Expert Solution
Questions # 67:

Your team sets up a Shared VPC Network where project co-vpc-prod is the host project. Your team has configured the firewall rules, subnets, and VPN gateway on the host project. They need to enable Engineering Group A to attach a Compute Engine instance to only the 10.1.1.0/24 subnet.

What should your team grant to Engineering Group A to meet this requirement?

Options:

A.

Compute Network User Role at the host project level.


B.

Compute Network User Role at the subnet level.


C.

Compute Shared VPC Admin Role at the host project level.


D.

Compute Shared VPC Admin Role at the service project level.


Expert Solution
Questions # 68:

Your organization processes sensitive health information. You want to ensure that data is encrypted while in use by the virtual machines (VMs). You must create a policy that is enforced across the entire organization.

What should you do?

Options:

A.

Implement an organization policy that ensures that all VM resources created across your organization use customer-managed encryption keys (CMEK) protection.


B.

Implement an organization policy that ensures all VM resources created across your organization are Confidential VM instances.


C.

Implement an organization policy that ensures that all VM resources created across your organization use Cloud External Key Manager (EKM) protection.


D.

No action is necessary because Google encrypts data while it is in use by default.


Expert Solution
Questions # 69:

Which international compliance standard provides guidelines for information security controls applicable to the provision and use of cloud services?

Options:

A.

ISO 27001


B.

ISO 27002


C.

ISO 27017


D.

ISO 27018


Expert Solution
Questions # 70:

Your organization is using GitHub Actions as a continuous integration and delivery (Cl/CD) platform. You must enable access to Google Cloud resources from the Cl/CD pipelines in the most secure way.

What should you do?

Options:

A.

Create a service account key and add it to the GitHub pipeline configuration file.


B.

Create a service account key and add it to the GitHub repository content.


C.

Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.


D.

Configure workload identity federation to use GitHub as an identity pool provider.


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions