Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

Professional-Cloud-Security-Engineer Google Cloud Certified - Professional Cloud Security Engineer is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

Professional-Cloud-Security-Engineer Practice Questions

Google Cloud Certified - Professional Cloud Security Engineer

Last Update 22 hours ago
Total Questions : 318

Dive into our fully updated and stable Professional-Cloud-Security-Engineer practice test platform, featuring all the latest Google Cloud Certified exam questions added this week. Our preparation tool is more than just a Google study aid; it's a strategic advantage.

Our free Google Cloud Certified practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about Professional-Cloud-Security-Engineer. Use this test to pinpoint which areas you need to focus your study on.

Professional-Cloud-Security-Engineer PDF

Professional-Cloud-Security-Engineer PDF (Printable)
$43.75
$124.99

Professional-Cloud-Security-Engineer Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$50.75
$144.99

Professional-Cloud-Security-Engineer PDF + Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$63.7
$181.99
Question # 41

Your company plans to move most of its IT infrastructure to Google Cloud. They want to leverage their existing on-premises Active Directory as an identity provider for Google Cloud. Which two steps should you take to integrate the company’s on-premises Active Directory with Google Cloud and configure access management? (Choose two.)

Options:

A.  

Use Identity Platform to provision users and groups to Google Cloud.

B.  

Use Cloud Identity SAML integration to provision users and groups to Google Cloud.

C.  

Install Google Cloud Directory Sync and connect it to Active Directory and Cloud Identity.

D.  

Create Identity and Access Management (1AM) roles with permissions corresponding to each Active Directory group.

E.  

Create Identity and Access Management (1AM) groups with permissions corresponding to each Active Directory group.

Discussion 0
Question # 42

You want to set up a secure, internal network within Google Cloud for database servers. The servers must not have any direct communication with the public internet. What should you do?

Options:

A.  

Assign a static public IP address to each database server. Use firewall rules to restrict external access.

B.  

Create a VPC with a private subnet. Assign a private IP address to each database server.

C.  

Assign both a private IP address and a public IP address to each database server.

D.  

Assign a private IP address to each database server. Use a NAT gateway to provide internet connectivity to the database servers.

Discussion 0
Question # 43

Your application is deployed as a highly available cross-region solution behind a global external HTTP(S) load balancer. You notice significant spikes in traffic from multiple IP addresses but it is unknown whether the IPs are malicious. You are concerned about your application's availability. You want to limit traffic from these clients over a specified time interval.

What should you do?

Options:

A.  

Configure a rate_based_ban action by using Google Cloud Armor and set the ban_duration_sec parameter to the specified time interval.

B.  

Configure a deny action by using Google Cloud Armor to deny the clients that issued too many requests over the specified time interval.

C.  

Configure a throttle action by using Google Cloud Armor to limit the number of requests per client over a specified time interval.

D.  

Configure a firewall rule in your VPC to throttle traffic from the identified IP addresses.

Discussion 0
Question # 44

Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).

Which steps should your team take before an incident occurs? (Choose two.)

Options:

A.  

Disable and revoke access to compromised keys.

B.  

Enable automatic key version rotation on a regular schedule.

C.  

Manually rotate key versions on an ad hoc schedule.

D.  

Limit the number of messages encrypted with each key version.

E.  

Disable the Cloud KMS API.

Discussion 0
Question # 45

Your company's storage team manages all product images within a specific Google Cloud project. To maintain control, you must isolate access to Cloud Storage for this project, allowing the storage team to manage restrictions at the project level. They must be restricted to using corporate computers. What should you do?

Options:

A.  

Employ organization-level firewall rules to block all traffic to Cloud Storage. Create exceptions for specific service accounts used by the storage team within their project.

B.  

Implement VPC Service Controls by establishing an organization-wide service perimeter with all projects. Configure ingress and egress rules to restrict access to Cloud Storage based on IP address ranges.

C.  

Use Context-Aware Access. Create an access level that defines the required context. Apply it as an organization policy specifically at the project level, restricting access to Cloud Storage based on that context.

D.  

Use Identity and Access Management (IAM) roles at the project level within the storage team's project. Grant the storage team granular permissions on the project's Cloud Storage resources.

Discussion 0
Question # 46

A customer wants to deploy a large number of 3-tier web applications on Compute Engine.

How should the customer ensure authenticated network separation between the different tiers of the application?

Options:

A.  

Run each tier in its own Project, and segregate using Project labels.

B.  

Run each tier with a different Service Account (SA), and use SA-based firewall rules.

C.  

Run each tier in its own subnet, and use subnet-based firewall rules.

D.  

Run each tier with its own VM tags, and use tag-based firewall rules.

Discussion 0
Question # 47

You are auditing all your Google Cloud resources in the production project. You want to identity all principals who can change firewall rules.

What should you do?

Options:

A.  

Use Policy Analyzer lo query the permissions compute, firewalls, create ofcompute, firewalls. Create of compute,firewalls.delete.

B.  

Reference the Security Health Analytics - Firewall Vulnerability Findings in the Security Command Center.

C.  

Use Policy Analyzer to query the permissions compute, firewalls, get of compute, firewalls, list.

D.  

Use Firewall Insights to understand your firewall rules usage patterns.

Discussion 0
Question # 48

Your company operates an application instance group that is currently deployed behind a Google Cloud load balancer in us-central-1 and is configured to use the Standard Tier network. The infrastructure team wants to expand to a second Google Cloud region, us-east-2. You need to set up a single external IP address to distribute new requests to the instance groups in both regions.

What should you do?

Options:

A.  

Change the load balancer backend configuration to use network endpoint groups instead of instance groups.

B.  

Change the load balancer frontend configuration to use the Premium Tier network, and add the new instance group.

C.  

Create a new load balancer in us-east-2 using the Standard Tier network, and assign a static external IP address.

D.  

Create a Cloud VPN connection between the two regions, and enable Google Private Access.

Discussion 0
Question # 49

You will create a new Service Account that should be able to list the Compute Engine instances in the project. You want to follow Google-recommended practices.

What should you do?

Options:

A.  

Create an Instance Template, and allow the Service Account Read Only access for the Compute Engine Access Scope.

B.  

Create a custom role with the permission compute.instances.list and grant the Service Account this role.

C.  

Give the Service Account the role of Compute Viewer, and use the new Service Account for all instances.

D.  

Give the Service Account the role of Project Viewer, and use the new Service Account for all instances.

Discussion 0
Question # 50

A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team wants to add a security layer so that the ERP systems only accept traffic from Cloud Identity- Aware Proxy.

What should the customer do to meet these requirements?

Options:

A.  

Make sure that the ERP system can validate the JWT assertion in the HTTP requests.

B.  

Make sure that the ERP system can validate the identity headers in the HTTP requests.

C.  

Make sure that the ERP system can validate the x-forwarded-for headers in the HTTP requests.

D.  

Make sure that the ERP system can validate the user’s unique identifier headers in the HTTP requests.

Discussion 0
Get Professional-Cloud-Security-Engineer dumps and pass your exam in 24 hours!

Free Exams Sample Questions