Google Professional Cloud Security Engineer Practice Exam Questions 131 to 140

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ก.ย. 2024
  • Below are the Practice Questions for Google Cloud Security Engineer Professional
    Question #131
    You perform a security assessment on a customer architecture and discover that multiple VMs have public IP addresses. After providing a recommendation to remove the public IP addresses, you are told those VMs need to communicate to external sites as part of the customer's typical operations. What should you recommend to reduce the need for public IP addresses in your customer's VMs?
    Question #132
    You are tasked with exporting and auditing security logs for login activity events for Google Cloud console and API calls that modify configurations to Google
    Cloud resources. Your export must meet the following requirements:
    · Export related logs for all projects in the Google Cloud organization.
    · Export logs in near real-time to an external SIEM.
    What should you do? (Choose two.)
    Question #133
    Your company's Chief Information Security Officer (CISO) creates a requirement that business data must be stored in specific locations due to regulatory requirements that affect the company's global expansion plans. After working on the details to implement this requirement, you determine the following:
    Question #134
    You need to set up a Cloud interconnect connection between your company's on-premises data center and VPC host network. You want to make sure that on- premises applications can only access Google APIs over the Cloud Interconnect and not through the public internet. You are required to only use APIs that are supported by VPC Service Controls to mitigate against exfiltration risk to non-supported APIs. How should you configure the network?
    Question #135
    You need to implement an encryption-at-rest strategy that protects sensitive data and reduces key management complexity for non-sensitive data. Your solution has the following requirements:
    · Schedule key rotation for sensitive data.
    · Control which region the encryption keys for sensitive data are stored in.
    · Minimize the latency to access encryption keys for both sensitive and non-sensitive data.
    What should you do?
    Question #136
    Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).
    Which steps should your team take before an incident occurs? (Choose two.)
    Question #137
    Your company's chief information security officer (CISO) is requiring business data to be stored in specific locations due to regulatory requirements that affect the company's global expansion plans. After working on a plan to implement this requirement, you determine the following:
    Question #138
    A database administrator notices malicious activities within their Cloud SQL instance. The database administrator wants to monitor the API calls that read the configuration or metadata of resources. Which logs should the database administrator review?
    Question #139
    You are backing up application logs to a shared Cloud Storage bucket that is accessible to both the administrator and analysts. Analysts should not have access to logs that contain any personally identifiable information (PII). Log files containing PII should be stored in another bucket that is only accessible to the administrator. What should you do?
    Question #140
    You work for an organization in a regulated industry that has strict data protection requirements. The organization backs up their data in the cloud. To comply with data privacy regulations, this data can only be stored for a specific length of time and must be deleted after this specific period.
    #Google_Professional_Cloud_Security_Engineer
    #Exam_Actual_Questions
    #clouds
    #security
    #certification
    #gcp

ความคิดเห็น •