The Best Professional-Cloud-Security-Engineer Exam Study Material and Preparation Test Question Dumps [Q20-Q40]

Rate this post

The Best Professional-Cloud-Security-Engineer Exam Study Material and Preparation Test Question Dumps

Get Ready to Pass the Professional-Cloud-Security-Engineer exam Right Now Using Our Google Cloud Certified Exam Package

QUESTION 20
You control network traffic for a folder in your Google Cloud environment. Your folder includes multiple projects and Virtual Private Cloud (VPC) networks You want to enforce on the folder level that egress connections are limited only to IP range 10.58.5.0/24 and only from the VPC network dev-vpc.” You want to minimize implementation and maintenance effort What should you do?

 
 
 
 

QUESTION 21
You are part of a security team that wants to ensure that a Cloud Storage bucket in Project A can only be readable from Project B.
You also want to ensure that data in the Cloud Storage bucket cannot be accessed from or copied to Cloud Storage buckets outside the network, even if the user has the correct credentials.
What should you do?

 
 
 
 

QUESTION 22
Which two implied firewall rules are defined on a VPC network? (Choose two.)

 
 
 
 
 

QUESTION 23
You want data on Compute Engine disks to be encrypted at rest with keys managed by Cloud Key Management Service (KMS). Cloud Identity and Access Management (IAM) permissions to these keys must be managed in a grouped way because the permissions should be the same for all keys.
What should you do?

 
 
 
 

QUESTION 24
An office manager at your small startup company is responsible for matching payments to invoices and creating billing alerts. For compliance reasons, the office manager is only permitted to have the Identity and Access Management (IAM) permissions necessary for these tasks. Which two IAM roles should the office manager have? (Choose two.)

 
 
 
 
 

QUESTION 25
You perform a security assessment on a customer architecture and discover that multiple VMs have public IP addresses. After providing a recommendation to remove the public IP addresses, you are told those VMs need to communicate to external sites as part of the customer’s typical operations. What should you recommend to reduce the need for public IP addresses in your customer’s VMs?

 
 
 
 

QUESTION 26
Which two implied firewall rules are defined on a VPC network? (Choose two.)

 
 
 
 
 

QUESTION 27
A website design company recently migrated all customer sites to App Engine. Some sites are still in progress and should only be visible to customers and company employees from any location.
Which solution will restrict access to the in-progress sites?

 
 
 
 

QUESTION 28
Your team wants to centrally manage GCP IAM permissions from their on-premises Active Directory Service. Your team wants to manage permissions by AD group membership.
What should your team do to meet these requirements?

 
 
 
 

QUESTION 29
A retail customer allows users to upload comments and product reviews. The customer needs to make sure the text does not include sensitive data before the comments or reviews are published.
Which Google Cloud Service should be used to achieve this?

 
 
 
 

QUESTION 30
A customer is collaborating with another company to build an application on Compute Engine. The customer is building the application tier in their GCP Organization, and the other company is building the storage tier in a different GCP Organization. This is a 3-tier web application. Communication between portions of the application must not traverse the public internet by any means.
Which connectivity option should be implemented?

 
 
 
 

QUESTION 31
An organization’s typical network and security review consists of analyzing application transit routes, request handling, and firewall rules. They want to enable their developer teams to deploy new applications without the overhead of this full review.
How should you advise this organization?

 
 
 
 

QUESTION 32
You are in charge of migrating a legacy application from your company datacenters to GCP before the current maintenance contract expires. You do not know what ports the application is using and no documentation is available for you to check. You want to complete the migration without putting your environment at risk.
What should you do?

 
 
 
 

QUESTION 33
You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)

 
 
 
 
 

QUESTION 34
You have noticed an increased number of phishing attacks across your enterprise user accounts. You want to implement the Google 2-Step Verification (2SV) option that uses a cryptographic signature to authenticate a user and verify the URL of the login page. Which Google 2SV option should you use?

 
 
 
 

QUESTION 35
Your team needs to configure their Google Cloud Platform (GCP) environment so they can centralize the control over networking resources like firewall rules, subnets, and routes. They also have an on-premises environment where resources need access back to the GCP resources through a private VPN connection. The networking resources will need to be controlled by the network security team.
Which type of networking design should your team use to meet these requirements?

 
 
 
 

QUESTION 36
Which Google Cloud service should you use to enforce access control policies for applications and resources?

 
 
 
 

QUESTION 37
Which international compliance standard provides guidelines for information security controls applicable to the provision and use of cloud services?

 
 
 
 

QUESTION 38
A customer needs to rely on their existing user directory with the requirements of native authentication against it when developing for Google Cloud Platform (GCP). They want to leverage their existing tooling and functionality to gather insight on user activity from a familiar interface. Which action should you take to meet the customer’s requirements?

 
 
 
 

QUESTION 39
A DevOps team will create a new container to run on Google Kubernetes Engine. As the application will be internet-facing, they want to minimize the attack surface of the container.
What should they do?

 
 
 
 

QUESTION 40
You need to implement an encryption at-rest strategy that reduces key management complexity for non-sensitive data and protects sensitive data while providing the flexibility of controlling the key residency and rotation schedule. FIPS 140-2 L1 compliance is required for all data types. What should you do?

 
 
 
 

Get Special Discount Offer of Professional-Cloud-Security-Engineer Certification Exam Sample Questions and Answers: https://www.passtestking.com/Google/Professional-Cloud-Security-Engineer-practice-exam-dumps.html

admin

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below
 

Post comment