PSE-3

PSE-3

Professional Development

50 Qs

quiz-placeholder

Similar activities

Written Test Modul 15 - G.46.RIT.020.01 Umum

Written Test Modul 15 - G.46.RIT.020.01 Umum

Professional Development

50 Qs

Davinci Resolve 17 Fusion 101

Davinci Resolve 17 Fusion 101

11th Grade - Professional Development

45 Qs

Kuis Sertifikasi Sales Force

Kuis Sertifikasi Sales Force

Professional Development

50 Qs

cipta kondisi

cipta kondisi

Professional Development

50 Qs

Employability Skills - 2nd Year 1-50

Employability Skills - 2nd Year 1-50

Professional Development

50 Qs

UHV - Harmony in Myself !

UHV - Harmony in Myself !

Professional Development

50 Qs

YB4 ProfEd - The Teacher and School Curriculum

YB4 ProfEd - The Teacher and School Curriculum

Professional Development

50 Qs

ochrona roślin

ochrona roślin

Professional Development

46 Qs

PSE-3

PSE-3

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Balamurugan R

Used 43+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amazon wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems. This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

Deterministic encryption

Secure, key-based hashes

Format-preserving encryption

Cryptographic hashing

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

Organization Administrator

Project Creator

Billing Account Viewer

Billing Account Costs Manager

Billing Account User

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are designing a new governance model for your organization's secrets that are stored in Secret Manager. Currently, secrets for Production and NonProduction applications are stored and accessed using service accounts. Your proposed solution must:

✑ Provide granular access to secrets

✑ Give you control over the rotation schedules for the encryption keys that wrap your secrets

✑ Maintain environment separation

✑ Provide ease of management

Which approach should you take?

Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using projectlevel identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

1. Use a single Google Cloud project to store both Production and Non-Production secrets.

2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.

1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secretlevel Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets

1. Use a single Google Cloud project to store both Production and Non-Production secrets.

2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data. Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud. What solution should you propose?

Use customer-managed encryption keys.

Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.

Enable Admin activity logs to monitor access to resources.

Enable Access Transparency logs with Access Approval requests for Google employees.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

SSO SAML as a third-party IdP

Identity Platform

OpenID Connect

Identity-Aware Proxy

Cloud Identity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You work for a large organization where each business unit has thousands of users. You need to delegate management of access control permissions to each business unit. You have the following requirements:

✑ Each business unit manages access controls for their own projects.

✑ Each business unit manages access control permissions at scale.

✑ Business units cannot access other business units' projects.

✑ Users lose their access if they move to a different business unit or leave the company.

✑ Users and access control permissions are managed by the on-premises directory service.

What should you do? (Choose two.)

Use VPC Service Controls to create perimeters around each business unit's project.

Organize projects in folders, and assign permissions to Google groups at the folder level.

Group business units based on Organization Units (OUs) and manage permissions based on OUs

Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.

Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:

✑ Scans must run at least once per week

✑ Must be able to detect cross-site scripting vulnerabilities

✑ Must be able to authenticate using Google accounts

Which solution should you use?

Google Cloud Armor

Web Security Scanner

Security Health Analytics

Container Threat Detection

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?