Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

Professional-Cloud-Security-Engineer Google Cloud Certified - Professional Cloud Security Engineer is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

Professional-Cloud-Security-Engineer Practice Questions

Google Cloud Certified - Professional Cloud Security Engineer

Last Update 23 hours ago
Total Questions : 318

Dive into our fully updated and stable Professional-Cloud-Security-Engineer practice test platform, featuring all the latest Google Cloud Certified exam questions added this week. Our preparation tool is more than just a Google study aid; it's a strategic advantage.

Our free Google Cloud Certified practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about Professional-Cloud-Security-Engineer. Use this test to pinpoint which areas you need to focus your study on.

Professional-Cloud-Security-Engineer PDF

Professional-Cloud-Security-Engineer PDF (Printable)
$43.75
$124.99

Professional-Cloud-Security-Engineer Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$50.75
$144.99

Professional-Cloud-Security-Engineer PDF + Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$63.7
$181.99
Question # 81

Your company is deploying a new application on GK

E.  

The application handles sensitive customer data and is subject to strict data residency requirements. You need to ensure that the data is stored only within the europe-west4 region. What should you do?

Options:

A.  

Create a GKE cluster in europe-west4. Configure a network policy to block all traffic to and from other regions. Use Kubernetes role-based access control (RBAC) to limit access to the cluster.

B.  

Train the development team on the data residency requirements, and use code reviews to ensure that all resources are deployed to europe-west4.

C.  

Use an organizational policy to restrict resource locations to europe-west4 for the project containing the GKE cluster.

D.  

Create a GKE cluster in europe-west4. Use a custom admission controller in GKE that validates the region of all deployed resources against a predefined allowed list.

Discussion 0
Question # 82

You manage a fleet of virtual machines (VMs) in your organization. You have encountered issues with lack of patching in many VMs. You need to automate regular patching in your VMs and view the patch management data across multiple projects.

What should you do?

Choose 2 answers

Options:

A.  

Deploy patches with VM Manager by using OS patch management

B.  

View patch management data in VM Manager by using OS patch management.

C.  

Deploy patches with Security Command Center by using Rapid Vulnerability Detection.

D.  

View patch management data in a Security Command Center dashboard.

E.  

View patch management data in Artifact Registry.

Discussion 0
Question # 83

You have been tasked with configuring Security Command Center for your organization’s Google Cloud environment. Your security team needs to receive alerts of potential crypto mining in the organization’s compute environment and alerts for common Google Cloud misconfigurations that impact security. Which Security Command Center features should you use to configure these alerts? (Choose two.)

Options:

A.  

Event Threat Detection

B.  

Container Threat Detection

C.  

Security Health Analytics

D.  

Cloud Data Loss Prevention

E.  

Google Cloud Armor

Discussion 0
Question # 84

A business unit at a multinational corporation signs up for GCP and starts moving workloads into GCP. The business unit creates a Cloud Identity domain with an organizational resource that has hundreds of projects.

Your team becomes aware of this and wants to take over managing permissions and auditing the domain resources.

Which type of access should your team grant to meet this requirement?

Options:

A.  

Organization Administrator

B.  

Security Reviewer

C.  

Organization Role Administrator

D.  

Organization Policy Administrator

Discussion 0
Question # 85

Your company conducts clinical trials and needs to analyze the results of a recent study that are stored in BigQuery. The interval when the medicine was taken contains start and stop dates The interval data is critical to the analysis, but specific dates may identify a particular batch and introduce bias You need to obfuscate the start and end dates for each row and preserve the interval data.

What should you do?

Options:

A.  

Use bucketing to shift values to a predetermined date based on the initial value.

B.  

Extract the date using TimePartConfig from each date field and append a random month and year

C.  

Use date shifting with the context set to the unique ID of the test subject

D.  

Use the FFX mode of format preserving encryption (FPE) and maintain data consistency

Discussion 0
Question # 86

A company migrated their entire data/center to Google Cloud Platform. It is running thousands of instances across multiple projects managed by different departments. You want to have a historical record of what was running in Google Cloud Platform at any point in time.

What should you do?

Options:

A.  

Use Resource Manager on the organization level.

B.  

Use Forseti Security to automate inventory snapshots.

C.  

Use Stackdriver to create a dashboard across all projects.

D.  

Use Security Command Center to view all assets across the organization.

Discussion 0
Question # 87

You have stored company approved compute images in a single Google Cloud project that is used as an image repository. This project is protected with VPC Service Controls and exists in the perimeter along with other projects in your organization. This lets other projects deploy images from the image repository project. A team requires deploying a third-party disk image that is stored in an external Google Cloud organization. You need to grant read access to the disk image so that it can be deployed into the perimeter.

What should you do?

Options:

A.  

• 1 Update the perimeter• 2 Configure the egressTo field to set identity Type to any_identity.• 3 Configure the egressFrom field to include the external Google Cloud project number as an allowed resource and the serviceName to compute. googleapis. com.

B.  

* Allow the external project by using the organizational policyconstraints/compute.trustedlmageProjects.

C.  

• 1 Update the perimeter• 2 Configure the egressTo field to include the external Google Cloud project number as an allowed resource and the serviceName to compute. googleapis. com.• 3 Configure the egressFrom field to set identity Type to any_idestity.

D.  

• 1 Update the perimeter• 2 Configure the ingressFrcm field to set identityType to an-y_identity.• 3 Configure the ingressTo field to include the external Google Cloud project number as an allowed resource and the serviceName to compute.googleapis -com.

Discussion 0
Question # 88

Your company is concerned about unauthorized parties gaming access to the Google Cloud environment by using a fake login page. You must implement a solution to protect against person-in-the-middle attacks.

Which security measure should you use?

Options:

A.  

Text message or phone call code

B.  

Security key

C.  

Google Authenticator application

D.  

Google prompt

Discussion 0
Question # 89

You have created an OS image that is hardened per your organization’s security standards and is being stored in a project managed by the security team. As a Google Cloud administrator, you need to make sure all VMs in your Google Cloud organization can only use that specific OS image while minimizing operational overhead. What should you do? (Choose two.)

Options:

A.  

Grant users the compuce.imageUser role in their own projects.

B.  

Grant users the compuce.imageUser role in the OS image project.

C.  

Store the image in every project that is spun up in your organization.

D.  

Set up an image access organization policy constraint, and list the security team managed project in the projects allow list.

E.  

Remove VM instance creation permission from users of the projects, and only allow you and your team to create VM instances.

Discussion 0
Question # 90

A customer deploys an application to App Engine and needs to check for Open Web Application Security Project (OWASP) vulnerabilities.

Which service should be used to accomplish this?

Options:

A.  

Cloud Armor

B.  

Google Cloud Audit Logs

C.  

Cloud Security Scanner

D.  

Forseti Security

Discussion 0
Get Professional-Cloud-Security-Engineer dumps and pass your exam in 24 hours!

Free Exams Sample Questions