Free Google PROFESSIONAL-CLOUD-SECURITY-ENGINEER Exam Questions (page: 11)

A company is deploying their application on Google Cloud Platform. Company policy requires long-term data to be stored using a solution that can automatically replicate data over at least two geographic places.

Which Storage solution are they allowed to use?

  1. Cloud Bigtable
  2. Cloud BigQuery
  3. Compute Engine SSD Disk
  4. Compute Engine Persistent Disk

Answer(s): B


Reference:

https://cloud.google.com/bigquery/docs/locations



A large e-retailer is moving to Google Cloud Platform with its ecommerce website. The company wants to ensure payment information is encrypted between the customer's browser and GCP when the customers checkout online.

What should they do?

  1. Configure an SSL Certificate on an L7 Load Balancer and require encryption.
  2. Configure an SSL Certificate on a Network TCP Load Balancer and require encryption.
  3. Configure the firewall to allow inbound traffic on port 443, and block all other inbound traffic.
  4. Configure the firewall to allow outbound traffic on port 443, and block all other outbound traffic.

Answer(s): A



Applications often require access to "secrets" - small pieces of sensitive data at build or run time. The administrator managing these secrets on GCP wants to keep a track of "who did what, where, and when?" within their GCP projects.

Which two log streams would provide the information that the administrator is looking for? (Choose two.)

  1. Admin Activity logs
  2. System Event logs
  3. Data Access logs
  4. VPC Flow logs
  5. Agent logs

Answer(s): A,C


Reference:

https://cloud.google.com/kms/docs/secret-management



You are in charge of migrating a legacy application from your company datacenters to GCP before the current maintenance contract expires. You do not know what ports the application is using and no documentation is available for you to check. You want to complete the migration without putting your environment at risk.

What should you do?

  1. Migrate the application into an isolated project using a "Lift & Shift" approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
  2. Migrate the application into an isolated project using a "Lift & Shift" approach in a custom network. Disable all traffic within the VPC and look at the Firewall logs to determine what traffic should be allowed for the application to work properly.
  3. Refactor the application into a micro-services architecture in a GKE cluster. Disable all traffic from outside the cluster using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
  4. Refactor the application into a micro-services architecture hosted in Cloud Functions in an isolated project.
    Disable all traffic from outside your project using Firewall Rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.

Answer(s): A



Your company has deployed an application on Compute Engine. The application is accessible by clients on port 587. You need to balance the load between the different instances running the application. The connection should be secured using TLS, and terminated by the Load Balancer.

What type of Load Balancing should you use?

  1. Network Load Balancing
  2. HTTP(S) Load Balancing
  3. TCP Proxy Load Balancing
  4. SSL Proxy Load Balancing

Answer(s): D


Reference:

https://cloud.google.com/load-balancing/docs/ssl/



Viewing page 11 of 74
Viewing questions 51 - 55 out of 361 questions



Post your Comments and Discuss Google PROFESSIONAL-CLOUD-SECURITY-ENGINEER exam prep with other Community members:

PROFESSIONAL-CLOUD-SECURITY-ENGINEER Exam Discussions & Posts