Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! Professional-Cloud-Security-Engineer Google Cloud Certified - Professional Cloud Security Engineer is now Stable and With Pass Result

Professional-Cloud-Security-Engineer Practice Exam Questions and Answers

Google Cloud Certified - Professional Cloud Security Engineer

Last Update 1 day ago
Total Questions : 266

Google Cloud Certified - Professional Cloud Security Engineer is stable now with all latest exam questions are added 1 day ago. Incorporating Professional-Cloud-Security-Engineer practice exam questions into your study plan is more than just a preparation strategy.

Professional-Cloud-Security-Engineer exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through Professional-Cloud-Security-Engineer dumps allows you to practice pacing yourself, ensuring that you can complete all Google Cloud Certified - Professional Cloud Security Engineer practice test within the allotted time frame.

Professional-Cloud-Security-Engineer PDF

Professional-Cloud-Security-Engineer PDF (Printable)
$50
$124.99

Professional-Cloud-Security-Engineer Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$58
$144.99

Professional-Cloud-Security-Engineer PDF + Testing Engine

Professional-Cloud-Security-Engineer PDF (Printable)
$72.8
$181.99
Question # 1

You are migrating an application into the cloud The application will need to read data from a Cloud Storage bucket. Due to local regulatory requirements, you need to hold the key material used for encryption fully under your control and you require a valid rationale for accessing the key material.

What should you do?

Options:

A.  

Encrypt the data in the Cloud Storage bucket by using Customer Managed Encryption Keys. Configure an 1AM deny policy for unauthorized groups

B.  

Encrypt the data in the Cloud Storage bucket by using Customer Managed Encryption Keys backed by a Cloud Hardware Security Module (HSM). Enable data access logs.

C.  

Generate a key in your on-premises environment and store it in a Hardware Security Module (HSM) that is managed on-premises Use this key as an external key in the Cloud Key Management Service (KMS). Activate Key Access Justifications (KAJ) and set the external key system to reject unauthorized accesses.

D.  

Generate a key in your on-premises environment to encrypt the data before you upload the data to the Cloud Storage bucket Upload the key to the Cloud Key Management Service (KMS). Activate Key Access Justifications (KAJ) and have the external key system reject unauthorized accesses.

Discussion 0
Question # 2

You manage one of your organization's Google Cloud projects (Project A). AVPC Service Control (SC) perimeter is blocking API access requests to this project including Pub/Sub. A resource running under a service account in another project (Project B) needs to collect messages from a Pub/Sub topic in your project Project B is not included in a VPC SC perimeter. You need to provide access from Project B to the Pub/Sub topic in Project A using the principle of least

Privilege.

What should you do?

Options:

A.  

Configure an ingress policy for the perimeter in Project A and allow access for the service account in Project B to collect messages.

B.  

Create an access level that allows a developer in Project B to subscribe to the Pub/Sub topic that is located in Project

A.  

C.  

Create a perimeter bridge between Project A and Project B to allow the required communication between both projects.

D.  

Remove the Pub/Sub API from the list of restricted services in the perimeter configuration for Project

A.  

Discussion 0
Question # 3

Your organization previously stored files in Cloud Storage by using Google Managed Encryption Keys (GMEK). but has recently updated the internal policy to require Customer Managed Encryption Keys (CMEK). You need to re-encrypt the files quickly and efficiently with minimal cost.

What should you do?

Options:

A.  

Encrypt the files locally, and then use gsutil to upload the files to a new bucket.

B.  

Copy the files to a new bucket with CMEK enabled in a secondary region

C.  

Reupload the files to the same Cloud Storage bucket specifying a key file by using gsutil.

D.  

Change the encryption type on the bucket to CMEK, and rewrite the objects

Discussion 0
Question # 4

A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team wants to add a security layer so that the ERP systems only accept traffic from Cloud Identity- Aware Proxy.

What should the customer do to meet these requirements?

Options:

A.  

Make sure that the ERP system can validate the JWT assertion in the HTTP requests.

B.  

Make sure that the ERP system can validate the identity headers in the HTTP requests.

C.  

Make sure that the ERP system can validate the x-forwarded-for headers in the HTTP requests.

D.  

Make sure that the ERP system can validate the user’s unique identifier headers in the HTTP requests.

Discussion 0
Question # 5

A customer has an analytics workload running on Compute Engine that should have limited internet access.

Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.

The Compute Engine instances now need to reach out to the public repository to get security updates. What should your team do?

Options:

A.  

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority greater than 1000.

B.  

Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority less than 1000.

C.  

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority greater than 1000.

D.  

Create an egress firewall rule to allow traffic to the hostname of the repository with a priority less than 1000.

Discussion 0
Question # 6

You recently joined the networking team supporting your company's Google Cloud implementation. You are tasked with familiarizing yourself with the firewall rules configuration and providing recommendations based on your networking and Google Cloud experience. What product should you recommend to detect firewall rules that are overlapped by attributes from other firewall rules with higher or equal priority?

Options:

A.  

Security Command Center

B.  

Firewall Rules Logging

C.  

VPC Flow Logs

D.  

Firewall Insights

Discussion 0
Question # 7

An organization’s typical network and security review consists of analyzing application transit routes, request handling, and firewall rules. They want to enable their developer teams to deploy new applications without the overhead of this full review.

How should you advise this organization?

Options:

A.  

Use Forseti with Firewall filters to catch any unwanted configurations in production.

B.  

Mandate use of infrastructure as code and provide static analysis in the CI/CD pipelines to enforce policies.

C.  

Route all VPC traffic through customer-managed routers to detect malicious patterns in production.

D.  

All production applications will run on-premises. Allow developers free rein in GCP as their dev and QA platforms.

Discussion 0
Question # 8

Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.

What should you do?

Options:

A.  

Use the Cloud Key Management Service to manage a data encryption key (DEK).

B.  

Use the Cloud Key Management Service to manage a key encryption key (KEK).

C.  

Use customer-supplied encryption keys to manage the data encryption key (DEK).

D.  

Use customer-supplied encryption keys to manage the key encryption key (KEK).

Discussion 0
Question # 9

You manage a fleet of virtual machines (VMs) in your organization. You have encountered issues with lack of patching in many VMs. You need to automate regular patching in your VMs and view the patch management data across multiple projects.

What should you do?

Choose 2 answers

Options:

A.  

Deploy patches with VM Manager by using OS patch management

B.  

View patch management data in VM Manager by using OS patch management.

C.  

Deploy patches with Security Command Center by using Rapid Vulnerability Detection.

D.  

View patch management data in a Security Command Center dashboard.

E.  

View patch management data in Artifact Registry.

Discussion 0
Question # 10

You are deploying regulated workloads on Google Cloud. The regulation has data residency and data access requirements. It also requires that support is provided from the same geographical location as where the data resides.

What should you do?

Options:

A.  

Enable Access Transparency Logging.

B.  

Deploy resources only to regions permitted by data residency requirements

C.  

Use Data Access logging and Access Transparency logging to confirm that no users are accessing data from another region.

D.  

Deploy Assured Workloads.

Discussion 0
Get Professional-Cloud-Security-Engineer dumps and pass your exam in 24 hours!

Free Exams Sample Questions