Professional-Cloud-Security-Engineer 無料問題集「Google Cloud Certified - Professional Cloud Security Engineer」
Your organization operates Virtual Machines (VMs) with only private IPs in the Virtual Private Cloud (VPC) with internet access through Cloud NAT. Everyday, you must patch all VMs with critical OS updates and provide summary reports.
What should you do?
What should you do?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
You need to set up a Cloud interconnect connection between your company's on-premises data center and VPC host network. You want to make sure that on- premises applications can only access Google APIs over the Cloud Interconnect and not through the public internet. You are required to only use APIs that are supported by VPC Service Controls to mitigate against exfiltration risk to non-supported APIs. How should you configure the network?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
You are developing an application that runs on a Compute Engine VM. The application needs to access data stored in Cloud Storage buckets in other Google Cloud projects. The required access to the buckets is variable. You need to provide access to these resources while following Google- recommended practices. What should you do?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A company is backing up application logs to a Cloud Storage bucket shared with both analysts and the administrator. Analysts should only have access to logs that do not contain any personally identifiable information (PII). Log files containing PII should be stored in another bucket that is only accessible by the administrator.
What should you do?
What should you do?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements:
- Follow the least privilege model by having only view access to logs.
- Have access to Admin Activity logs.
- Have access to Data Access logs.
- Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?
- Follow the least privilege model by having only view access to logs.
- Have access to Admin Activity logs.
- Have access to Data Access logs.
- Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Your organization is migrating business critical applications to Google Cloud across multiple projects. You only have the required IAM permission at the Google Cloud organization level. You want to grant project access to support engineers from two partner organizations using their existing identity provider (IdP) credentials. What should you do?
正解:C
解答を投票する
Your EU-based organization stores both Personally Identifiable Information (PII) and non-PII data in Cloud Storage buckets across multiple Google Cloud regions. EU data privacy laws require that the PII data must not be stored outside of the EU. To help meet this compliance requirement, you want to detect if Cloud Storage buckets outside of the EU contain healthcare data. What should you do?
正解:A
解答を投票する
You are working with a client that is concerned about control of their encryption keys for sensitive data. The client does not want to store encryption keys at rest in the same cloud service provider (CSP) as the data that the keys are encrypting. Which Google Cloud encryption solutions should you recommend to this client? (Choose two.)
正解:A、B
解答を投票する
Your organization hosts a sensitive web application in Google Cloud. To protect the web application, you've set up a virtual private cloud (VPC) with dedicated subnets for the application's frontend and backend components. You must implement security controls to restrict incoming traffic, protect against web-based attacks, and monitor internal traffic. What should you do?
正解:B
解答を投票する
Your company conducts clinical trials and needs to analyze the results of a recent study that are stored in BigQuery. The interval when the medicine was taken contains start and stop dates. The interval data is critical to the analysis, but specific dates may identify a particular batch and introduce bias. You need to obfuscate the start and end dates for each row and preserve the interval data.
What should you do?
What should you do?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).
Which steps should your team take before an incident occurs? (Choose two.)
Which steps should your team take before an incident occurs? (Choose two.)
正解:B、E
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)