Google Cloud Professional Cloud Security Engineer

Google Cloud Professional Cloud Security Engineer

Professional Development

60 Qs

quiz-placeholder

Similar activities

Selling HPE Solution Foundations - Module 1

Selling HPE Solution Foundations - Module 1

Professional Development

60 Qs

AWS Security 01

AWS Security 01

Professional Development

58 Qs

Microsoft Azure Fundamentals AZ-900 ENG #1

Microsoft Azure Fundamentals AZ-900 ENG #1

University - Professional Development

55 Qs

AWS Cloud Practitioner Q3

AWS Cloud Practitioner Q3

Professional Development

65 Qs

Microsoft Azure Fundamentals AZ-900 ENG #2

Microsoft Azure Fundamentals AZ-900 ENG #2

University - Professional Development

55 Qs

Summer PD Technology 101

Summer PD Technology 101

Professional Development

64 Qs

CompTIA Security + : Architecture and Design

CompTIA Security + : Architecture and Design

Professional Development

64 Qs

Google Cloud Professional Cloud Security Engineer (Part 5)

Google Cloud Professional Cloud Security Engineer (Part 5)

Professional Development

60 Qs

Google Cloud Professional Cloud Security Engineer

Google Cloud Professional Cloud Security Engineer

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Mauricio Ardon

Used 2+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization relies heavily on virtual machines (VMs) in Compute Engine. Due to team growth and resource demands, VM sprawl is becoming problematic. Maintaining consistent security hardening and timely package updates poses an increasing challenge. You need to centralize VM image management and automate the enforcement of security baselines throughout the virtual machine lifecycle. What should you do?

A. Use VM Manager to automatically distribute and apply patches to YMs across your projects. Integrate VM Manager with hardened, organization-standard VM images stored in a central repository.

  • B. Configure the sole-tenancy feature in Compute Engine for all projects. Set up custom organization policies in Policy Controller to restrict the operating systems and image sources that teams are allowed to use.

  • C. Create a Cloud Build trigger to build a pipeline that generates hardened VM images. Run vulnerability scans in the pipeline, and store images with passing scans in a registry. Use instance templates pointing to this registry.

  • D. Activate Security Command Center Enterprise. Use VM discovery and posture management features to monitor hardening state and trigger automatic responses upon detection of issues.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Customers complain about error messages when they access your organization's website. You suspect that the web application firewall rules configured in Cloud Armor are too strict. You want to collect request logs to investigate what triggered the rules and blocked the traffic. What should you do?

  • A. Modify the Application Load Balancer backend and increase the tog sample rate to a higher number.

B. Enable logging in the Application Load Balancer backend and set the log level to VERBOSE in the Cloud Armor policy.

  • C. Change the configuration of suspicious web application firewall rules in the Cloud Armor policy to preview mode.

  • D. Create a log sink with a filter for togs containing redirected_by_security_policy and set a BigQuery dataset as destination.

Hide Solution

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization must follow the Payment Card Industry Data Security Standard (PCI DSS). To prepare for an audit, you must detect deviations on an infrastructure-as-a-service level in your Google Cloud landing zone. What should you do?

  • A. Modify the Application Load Balancer backend and increase the tog sample rate to a higher number.

B. Enable logging in the Application Load Balancer backend and set the log level to VERBOSE in the Cloud Armor policy.

  • C. Change the configuration of suspicious web application firewall rules in the Cloud Armor policy to preview mode.

  • D. Create a log sink with a filter for togs containing redirected_by_security_policy and set a BigQuery dataset as destination.

Hide Solution

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization must follow the Payment Card Industry Data Security Standard (PCI DSS). To prepare for an audit, you must detect deviations on an infrastructure-as-a-service level in your Google Cloud landing zone. What should you do?

  • A. Create a data profile covering all payment relevant data types. Configure Data Discovery and a risk analysis job in Google Cloud Sensitive Data Protection to analyze findings.

  • B. Use the Google Cloud Compliance Reports Manager to download the latest version of the PCI DSS report Analyze the report to detect deviations.

  • C. Create an Assured Workloads folder in your Google Cloud organization. Migrate existing projects into the folder and monitor for deviations in the PCI DSS.

D. Activate Security Command Center Premium. Use the Compliance Monitoring product to filter findings that may not be PCI DSS compliant.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is migrating a complex application to Google Cloud. The application has multiple internal components that interact with each other across several Google Cloud projects. Security is a major concern, and you must design an authorization scheme for administrators that aligns with the principles of least privilege and separation of duties. What should you do?

A. Identify the users who will migrate the application, revoke the default user roles and assign the users with purposely created custom roles.

  • B. Use multiple external identity providers (IdP) configured to use different SAML profiles and federate the IdPs for each application component.

  • C. Configure multi-factor authentication (MFA) to enforce the use of physical tokens for all users who will migrate the application.

  • D. No action needed. When a Google Cloud organization is created, the appropriate permissions are automatically assigned to all users in the domain.

Hide Solution  Discussion  2

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization operates in a highly regulated industry and needs to implement strict controls around temporary access to sensitive Google Cloud resources. You have been using Access Approval to manage this access, but your compliance team has mandated the use of a custom signing key. Additionally, they require that the key be stored in a hardware security module (HSM) located outside Google Cloud. You need to configure Access Approval to use a custom signing key that meets the compliance requirements. What should you do?

  • A. Create a new asymmetric signing key in Cloud Key Management System (Cloud KMS) using a supported algorithm and grant the Access Approval service account the IAM signerVerifier role on the key.

  • B. Export your existing Access Approval signing key as a PEM file. Upload the file to your external HSM and reconfigure Access Approval to use the key from the HSM.

C. Create a signing key in your external HSM. Integrate the HSM with Cloud External Key Manager (Cloud EKM) and make the key available within your project. Configure Access Approval to use this key

  • D. Create a new asymmetric signing key in Cloud KMS and configure the key with a rotation period of 30 days. Add the corresponding public key to your external HSM.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has sensitive data stored in BigQuery and Cloud Storage. You need to design a solution that provides granular and flexible control authorization to read data. What should you do?

  • A. Deidentify sensitive fields within the dataset by using data leakage protection within the Sensitive Data Protection services.

  • B. Use Cloud External Key Manager (Cloud EKM) to encrypt the data in BigQuery and Cloud Storage.

C. Grant identity and access management (IAM) roles and permissions to principals.

  • D. Enable server-side encryption on the data in BigQuery and Cloud Storage.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?