Google Professional Cloud Security Engineer Exam (Part 3)

Google Professional Cloud Security Engineer Exam (Part 3)

Professional Development

51 Qs

quiz-placeholder

Similar activities

PCA-3

PCA-3

Professional Development

50 Qs

PCA-1

PCA-1

Professional Development

50 Qs

MCQsPDE Personal 1st 50

MCQsPDE Personal 1st 50

Professional Development

50 Qs

AWS CP Exam 04

AWS CP Exam 04

Professional Development

55 Qs

Google Ace - Set 3

Google Ace - Set 3

Professional Development

53 Qs

(Part 2) Cloud Essentials Study Guide

(Part 2) Cloud Essentials Study Guide

Professional Development

48 Qs

Educador Nivel 1 Capacitación sobre los aspectos básicos de Google (Temas 1,2 y 3)

Educador Nivel 1 Capacitación sobre los aspectos básicos de Google (Temas 1,2 y 3)

Professional Development

55 Qs

PCA-4

PCA-4

Professional Development

50 Qs

Google Professional Cloud Security Engineer Exam (Part 3)

Google Professional Cloud Security Engineer Exam (Part 3)

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Mauricio Ardon

Used 1+ times

FREE Resource

51 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company wants to determine what products they can build to help customers improve their credit scores depending on their age range. To achieve this, you need to join user information in the company's banking app with customers' credit score data received from a third party. While using this raw data will allow you to complete this task, it exposes sensitive data, which could be propagated into new systems.
This risk needs to be addressed using de-identification and tokenization with Cloud Data Loss Prevention while maintaining the referential integrity across the database. Which cryptographic token format should you use to meet these requirements?

A. Deterministic encryption

  • B. Secure, key-based hashes

  • C. Format-preserving encryption

  • D. Cryptographic hashing

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

  • A. Organization Administrator

  • B. Project Creator

C. Billing Account Viewer

D. Billing Account Costs Manager

  • E. Billing Account User

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are designing a new governance model for your organization's secrets that are stored in Secret Manager. Currently, secrets for Production and Non-
Production applications are stored and accessed using service accounts. Your proposed solution must:
✑ Provide granular access to secrets
✑ Give you control over the rotation schedules for the encryption keys that wrap your secrets
✑ Maintain environment separation
✑ Provide ease of management
Which approach should you take?

A. 1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

  • B. 1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.

  • C. 1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using secret-level Identity and Access Management (IAM) bindings. 3. Use Google-managed encryption keys to encrypt secrets.

  • D. 1. Use a single Google Cloud project to store both Production and Non-Production secrets. 2. Enforce access control to secrets using project-level Identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data. Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud.
What solution should you propose?

  • A. Use customer-managed encryption keys.

  • B. Use Google's Identity and Access Management (IAM) service to manage access controls on Google Cloud.

  • C. Enable Admin activity logs to monitor access to resources.

D. Enable Access Transparency logs with Access Approval requests for Google employees.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

A. SSO SAML as a third-party IdP

  • B. Identity Platform

  • C. OpenID Connect

  • D. Identity-Aware Proxy

E. Cloud Identity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You work for a large organization where each business unit has thousands of users. You need to delegate management of access control permissions to each business unit. You have the following requirements:
✑ Each business unit manages access controls for their own projects.
✑ Each business unit manages access control permissions at scale.
✑ Business units cannot access other business units' projects.
✑ Users lose their access if they move to a different business unit or leave the company.
✑ Users and access control permissions are managed by the on-premises directory service.
What should you do? (Choose two.)

  • A. Use VPC Service Controls to create perimeters around each business unit's project.

B. Organize projects in folders, and assign permissions to Google groups at the folder level.

  • C. Group business units based on Organization Units (OUs) and manage permissions based on OUs

  • D. Create a project naming convention, and use Google's IAM Conditions to manage access based on the prefix of project names.

E. Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:
✑ Scans must run at least once per week
✑ Must be able to detect cross-site scripting vulnerabilities
✑ Must be able to authenticate using Google accounts
Which solution should you use?

  • A. Google Cloud Armor

B. Web Security Scanner

  • C. Security Health Analytics

  • D. Container Threat Detection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?