A customer wants to deploy a large number of 3-tier web applications on Compute Engine.How should the customer ensure authenticated network separation between the different tiers of the application?
Answer(s): B
A manager wants to start retaining security event logs for 2 years while minimizing costs. You write a filter to select the appropriate log entries.Where should you export the logs?
https://cloud.google.com/logging/docs/exclusions
For compliance reasons, an organization needs to ensure that in-scope PCI Kubernetes Pods reside on "in- scope" Nodes only. These Nodes can only contain the "in-scope" Pods.How should the organization achieve this objective?
Answer(s): C
In an effort for your company messaging app to comply with FIPS 140-2, a decision was made to use GCP compute and network services. The messaging app architecture includes a Managed Instance Group (MIG) that controls a cluster of Compute Engine instances. The instances use Local SSDs for data caching and UDP for instance-to-instance communications. The app development team is willing to make any changes necessary to comply with the standard.Which options should you recommend to meet the requirements?
Answer(s): A
A customer has an analytics workload running on Compute Engine that should have limited internet access.Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.The Compute Engine instances now need to reach out to the public repository to get security updates.What should your team do?
Post your Comments and Discuss Google PROFESSIONAL-CLOUD-SECURITY-ENGINEER exam dumps with other Community members:
DaemonSet
gcloud config configurations describe
gcloud
gcloud config configurations describe <CONFIG_NAME>
kubectl
Azure Data Factory
firewall
host
Amazon AppFlow
S3 event notification
SNS
C:\Windows\System32\drivers\etc\hosts
/etc/hosts
nslookup <URL>
ping <URL>
ipconfig /flushdns
clusterIP: None
myservice-0
myservice-1
AWS PrivateLink
RFC 1918
VPN
Our website is free, but we have to fight against AI bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the PROFESSIONAL-CLOUD-SECURITY-ENGINEER content, but please register or login to continue.