New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

You are auditing all your Google Cloud resources in the production project. You want to identity all principals who can change firewall rules.

What should you do?

Options:

A.

Use Policy Analyzer lo query the permissions compute, firewalls, create ofcompute, firewalls. Create of compute,firewalls.delete.


B.

Reference the Security Health Analytics - Firewall Vulnerability Findings in the Security Command Center.


C.

Use Policy Analyzer to query the permissions compute, firewalls, get of compute, firewalls, list.


D.

Use Firewall Insights to understand your firewall rules usage patterns.


Expert Solution
Questions # 72:

You work for an organization in a regulated industry that has strict data protection requirements. The organization backs up their data in the cloud. To comply with data privacy regulations, this data can only be stored for a specific length of time and must be deleted after this specific period.

You want to automate the compliance with this regulation while minimizing storage costs. What should you do?

Options:

A.

Store the data in a persistent disk, and delete the disk at expiration time.


B.

Store the data in a Cloud Bigtable table, and set an expiration time on the column families.


C.

Store the data in a BigQuery table, and set the table's expiration time.


D.

Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.


Expert Solution
Questions # 73:

You recently joined the networking team supporting your company's Google Cloud implementation. You are tasked with familiarizing yourself with the firewall rules configuration and providing recommendations based on your networking and Google Cloud experience. What product should you recommend to detect firewall rules that are overlapped by attributes from other firewall rules with higher or equal priority?

Options:

A.

Security Command Center


B.

Firewall Rules Logging


C.

VPC Flow Logs


D.

Firewall Insights


Expert Solution
Questions # 74:

Your company wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems.

This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

Options:

A.

Deterministic encryption


B.

Secure, key-based hashes


C.

Format-preserving encryption


D.

Cryptographic hashing


Expert Solution
Questions # 75:

In an effort for your company messaging app to comply with FIPS 140-2, a decision was made to use GCP compute and network services. The messaging app architecture includes a Managed Instance Group (MIG) that controls a cluster of Compute Engine instances. The instances use Local SSDs for data caching and UDP for instance-to-instance communications. The app development team is willing to make any changes necessary to comply with the standard

Which options should you recommend to meet the requirements?

Options:

A.

Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module.


B.

Set Disk Encryption on the Instance Template used by the MIG to customer-managed key and use BoringSSL for all data transit between instances.


C.

Change the app instance-to-instance communications from UDP to TCP and enable BoringSSL on clients' TLS connections.


D.

Set Disk Encryption on the Instance Template used by the MIG to Google-managed Key and use BoringSSL library on all instance-to-instance communications.


Expert Solution
Questions # 76:

A patch for a vulnerability has been released, and a DevOps team needs to update their running containers in Google Kubernetes Engine (GKE).

How should the DevOps team accomplish this?

Options:

A.

Use Puppet or Chef to push out the patch to the running container.


B.

Verify that auto upgrade is enabled; if so, Google will upgrade the nodes in a GKE cluster.


C.

Update the application code or apply a patch, build a new image, and redeploy it.


D.

Configure containers to automatically upgrade when the base image is available in Container Registry.


Expert Solution
Questions # 77:

Your organization leverages folders to represent different teams within your Google Cloud environment. To support Infrastructure as Code (IaC) practices, each team receives a dedicated service account upon onboarding. You want to ensure that teams have comprehensive permissions to manage resources within their assigned folders while adhering to the principle of least privilege. You must design the permissions for these team-based service accounts in the most effective way possible. What should you do?​

Options:

A.

Grant each service account the folder administrator role on its respective folder.​


B.

Grant each service account the project creator role at the organization level and use folder-level IAM conditions to restrict project creation to specific folders.​Reddit


C.

Assign each service account the project editor role at the organization level and instruct teams to use IAM bindings at the folder level for fine-grained permissions.​


D.

Assign each service account the folder IAM administrator role on its respective folder to allow teams to create and manage additional custom roles if needed.​


Expert Solution
Questions # 78:

A customer wants to make it convenient for their mobile workforce to access a CRM web interface that is hosted on Google Cloud Platform (GCP). The CRM can only be accessed by someone on the corporate network. The customer wants to make it available over the internet. Your team requires an authentication layer in front of the application that supports two-factor authentication

Which GCP product should the customer implement to meet these requirements?

Options:

A.

Cloud Identity-Aware Proxy


B.

Cloud Armor


C.

Cloud Endpoints


D.

Cloud VPN


Expert Solution
Questions # 79:

A company is running their webshop on Google Kubernetes Engine and wants to analyze customer transactions in BigQuery. You need to ensure that no credit card numbers are stored in BigQuery

What should you do?

Options:

A.

Create a BigQuery view with regular expressions matching credit card numbers to query and delete affected rows.


B.

Use the Cloud Data Loss Prevention API to redact related infoTypes before data is ingested into BigQuery.


C.

Leverage Security Command Center to scan for the assets of type Credit Card Number in BigQuery.


D.

Enable Cloud Identity-Aware Proxy to filter out credit card numbers before storing the logs in BigQuery.


Expert Solution
Questions # 80:

An organization is migrating from their current on-premises productivity software systems to G Suite. Some network security controls were in place that were mandated by a regulatory body in their region for their previous on-premises system. The organization’s risk team wants to ensure that network security controls are maintained and effective in G Suite. A security architect supporting this migration has been asked to ensure that network security controls are in place as part of the new shared responsibility model between the organization and Google Cloud.

What solution would help meet the requirements?

Options:

A.

Ensure that firewall rules are in place to meet the required controls.


B.

Set up Cloud Armor to ensure that network security controls can be managed for G Suite.


C.

Network security is a built-in solution and Google’s Cloud responsibility for SaaS products like G Suite.


D.

Set up an array of Virtual Private Cloud (VPC) networks to control network security as mandated by the relevant regulation.


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions