New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Google Cloud Certified Professional-Cloud-Security-Engineer Questions and answers with CertsForce

Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions
Questions # 81:

Your company runs a website that will store PII on Google Cloud Platform. To comply with data privacy regulations, this data can only be stored for a specific amount of time and must be fully deleted after this specific period. Data that has not yet reached the time period should not be deleted. You want to automate the process of complying with this regulation.

What should you do?

Options:

A.

Store the data in a single Persistent Disk, and delete the disk at expiration time.


B.

Store the data in a single BigQuery table and set the appropriate table expiration time.


C.

Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.


D.

Store the data in a single BigTable table and set an expiration time on the column families.


Expert Solution
Questions # 82:

You are setting up a new Cloud Storage bucket in your environment that is encrypted with a customer managed encryption key (CMEK). The CMEK is stored in Cloud Key Management Service (KMS). in project "pr j -a", and the Cloud Storage bucket will use project "prj-b". The key is backed by a Cloud Hardware Security Module (HSM) and resides in the region europe-west3. Your storage bucket will be located in the region europe-west1. When you create the bucket, you cannot access the key. and you need to troubleshoot why.

What has caused the access issue?

Options:

A.

A firewall rule prevents the key from being accessible.


B.

Cloud HSM does not support Cloud Storage


C.

The CMEK is in a different project than the Cloud Storage bucket


D.

The CMEK is in a different region than the Cloud Storage bucket.


Expert Solution
Questions # 83:

Your company conducts clinical trials and needs to analyze the results of a recent study that are stored in BigQuery. The interval when the medicine was taken contains start and stop dates The interval data is critical to the analysis, but specific dates may identify a particular batch and introduce bias You need to obfuscate the start and end dates for each row and preserve the interval data.

What should you do?

Options:

A.

Use bucketing to shift values to a predetermined date based on the initial value.


B.

Extract the date using TimePartConfig from each date field and append a random month and year


C.

Use date shifting with the context set to the unique ID of the test subject


D.

Use the FFX mode of format preserving encryption (FPE) and maintain data consistency


Expert Solution
Questions # 84:

A retail customer allows users to upload comments and product reviews. The customer needs to make sure the text does not include sensitive data before the comments or reviews are published.

Which Google Cloud Service should be used to achieve this?

Options:

A.

Cloud Key Management Service


B.

Cloud Data Loss Prevention API


C.

BigQuery


D.

Cloud Security Scanner


Expert Solution
Questions # 85:

Your company requires the security and network engineering teams to identify all network anomalies within and across VPCs, internal traffic from VMs to VMs, traffic between end locations on the internet and VMs, and traffic between VMs to Google Cloud services in production. Which method should you use?

Options:

A.

Define an organization policy constraint.


B.

Configure packet mirroring policies.


C.

Enable VPC Flow Logs on the subnet.


D.

Monitor and analyze Cloud Audit Logs.


Expert Solution
Questions # 86:

You are the Security Admin in your company. You want to synchronize all security groups that have an email address from your LDAP directory in Cloud IAM.

What should you do?

Options:

A.

Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have “user email address” as the attribute to facilitate one-way sync.


B.

Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have “user email address” as the attribute to facilitate bidirectional sync.


C.

Use a management tool to sync the subset based on the email address attribute. Create a group in the Google domain. A group created in a Google domain will automatically have an explicit Google Cloud Identity and Access Management (IAM) role.


D.

Use a management tool to sync the subset based on group object class attribute. Create a group in the Google domain. A group created in a Google domain will automatically have an explicit Google Cloud Identity and Access Management (IAM) role.


Expert Solution
Questions # 87:

Your team wants to make sure Compute Engine instances running in your production project do not have public IP addresses. The frontend application Compute Engine instances will require public IPs. The product engineers have the Editor role to modify resources. Your team wants to enforce this requirement.

How should your team meet these requirements?

Options:

A.

Enable Private Access on the VPC network in the production project.


B.

Remove the Editor role and grant the Compute Admin IAM role to the engineers.


C.

Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.


D.

Set up a VPC network with two subnets: one with public IPs and one without public IPs.


Expert Solution
Questions # 88:

Your company is using Cloud Dataproc for its Spark and Hadoop jobs. You want to be able to create, rotate,

and destroy symmetric encryption keys used for the persistent disks used by Cloud Dataproc. Keys can be stored in the cloud.

What should you do?

Options:

A.

Use the Cloud Key Management Service to manage the data encryption key (DEK).


B.

Use the Cloud Key Management Service to manage the key encryption key (KEK).


C.

Use customer-supplied encryption keys to manage the data encryption key (DEK).


D.

Use customer-supplied encryption keys to manage the key encryption key (KEK).


Expert Solution
Questions # 89:

Your organization has hired a small, temporary partner team for 18 months. The temporary team will work alongside your DevOps team to develop your organization's application that is hosted on Google Cloud. You must give the temporary partner team access to your application's resources on Google Cloud and ensure that partner employees lose access if they are removed from their employer's organization. What should you do?

Options:

A.

Implement just-in-time privileged access to Google Cloud for the temporary partner team.


B.

Create a temporary username and password for the temporary partner team members. Auto-clean the usernames and passwords after the work engagement has ended.


C.

Add the identities of the temporary partner team members to your identity provider (IdP).


D.

Create a workforce identity pool and federate the identity pool with the identity provider (IdP) of the temporary partner team.


Expert Solution
Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions