PSE-3

PSE-3

Professional Development

50 Qs

quiz-placeholder

Similar activities

Google Professional Cloud Security Engineer Exam (Part 2)

Google Professional Cloud Security Engineer Exam (Part 2)

Professional Development

51 Qs

Google ACE - Set 2

Google ACE - Set 2

Professional Development

53 Qs

ACE-3

ACE-3

Professional Development

50 Qs

PDE-2022-2

PDE-2022-2

Professional Development

50 Qs

lorem ipsum AWS D4 cap.1-2

lorem ipsum AWS D4 cap.1-2

Professional Development

55 Qs

PDE-2022-3

PDE-2022-3

Professional Development

50 Qs

AWS Practitioner 12

AWS Practitioner 12

Professional Development

48 Qs

Google Professional Cloud Security Engineer Exam (Part 3)

Google Professional Cloud Security Engineer Exam (Part 3)

Professional Development

51 Qs

PSE-3

PSE-3

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Balamurugan R

Used 43+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amazon wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems. This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

Deterministic encryption

Secure, key-based hashes

Format-preserving encryption

Cryptographic hashing

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

Organization Administrator

Project Creator

Billing Account Viewer

Billing Account Costs Manager

Billing Account User

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are designing a new governance model for your organization's secrets that are stored in Secret Manager. Currently, secrets for Production and NonProduction applications are stored and accessed using service accounts. Your proposed solution must:

✑ Provide granular access to secrets

✑ Give you control over the rotation schedules for the encryption keys that wrap your secrets

✑ Maintain environment separation

✑ Provide ease of management

Which approach should you take?

Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using projectlevel identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

1. Use a single Google Cloud project to store both Production and Non-Production secrets.

2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.

1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secretlevel Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets

1. Use a single Google Cloud project to store both Production and Non-Production secrets.

2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data. Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud. What solution should you propose?

Use customer-managed encryption keys.

Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.

Enable Admin activity logs to monitor access to resources.

Enable Access Transparency logs with Access Approval requests for Google employees.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

SSO SAML as a third-party IdP

Identity Platform

OpenID Connect

Identity-Aware Proxy

Cloud Identity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You work for a large organization where each business unit has thousands of users. You need to delegate management of access control permissions to each business unit. You have the following requirements:

✑ Each business unit manages access controls for their own projects.

✑ Each business unit manages access control permissions at scale.

✑ Business units cannot access other business units' projects.

✑ Users lose their access if they move to a different business unit or leave the company.

✑ Users and access control permissions are managed by the on-premises directory service.

What should you do? (Choose two.)

Use VPC Service Controls to create perimeters around each business unit's project.

Organize projects in folders, and assign permissions to Google groups at the folder level.

Group business units based on Organization Units (OUs) and manage permissions based on OUs

Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.

Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:

✑ Scans must run at least once per week

✑ Must be able to detect cross-site scripting vulnerabilities

✑ Must be able to authenticate using Google accounts

Which solution should you use?

Google Cloud Armor

Web Security Scanner

Security Health Analytics

Container Threat Detection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?