Google Professional Cloud Security Engineer Exam (Part 2)

Google Professional Cloud Security Engineer Exam (Part 2)

Professional Development

51 Qs

quiz-placeholder

Similar activities

PDE-2022-3

PDE-2022-3

Professional Development

50 Qs

PSE-3

PSE-3

Professional Development

50 Qs

lorem ipsum AWS D4 cap.1-2

lorem ipsum AWS D4 cap.1-2

Professional Development

55 Qs

CDL-1

CDL-1

Professional Development

50 Qs

Microsoft Azure Fundamentals AZ-900 ENG #6

Microsoft Azure Fundamentals AZ-900 ENG #6

University - Professional Development

50 Qs

PCA-4

PCA-4

Professional Development

50 Qs

PCA-3

PCA-3

Professional Development

50 Qs

ACE-3

ACE-3

Professional Development

50 Qs

Google Professional Cloud Security Engineer Exam (Part 2)

Google Professional Cloud Security Engineer Exam (Part 2)

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Mauricio Ardon

Used 3+ times

FREE Resource

51 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to limit the images that can be used as the source for boot disks. These images will be stored in a dedicated project.
What should you do?

A. Use the Organization Policy Service to create a compute.trustedimageProjects constraint on the organization level. List the trusted project as the whitelist in an allow operation.

  • B. Use the Organization Policy Service to create a compute.trustedimageProjects constraint on the organization level. List the trusted projects as the exceptions in a deny operation.

  • C. In Resource Manager, edit the project permissions for the trusted project. Add the organization as member with the role: Compute Image User.

  • D. In Resource Manager, edit the organization permissions. Add the project ID as member with the role: Compute Image User.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Your team needs to prevent users from creating projects in the organization. Only the DevOps team should be allowed to create projects on behalf of the requester.
Which two tasks should your team perform to handle this request? (Choose two.)

A. Remove all users from the Project Creator role at the organizational level.

  • B. Create an Organization Policy constraint, and apply it at the organizational level.

  • C. Grant the Project Editor role at the organizational level to a designated group of users.

D. Add a designated group of users to the Project Creator role at the organizational level.

  • E. Grant the billing account creator role to the designated DevOps team.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A customer deployed an application on Compute Engine that takes advantage of the elastic nature of cloud computing.
How can you work with Infrastructure Operations Engineers to best ensure that Windows Compute Engine VMs are up to date with all the latest OS patches?

A. Build new base images when patches are available, and use a CI/CD pipeline to rebuild VMs, deploying incrementally

  • B. Federate a Domain Controller into Compute Engine, and roll out weekly patches via Group Policy Object.

  • C. Use Deployment Manager to provision updated VMs into new serving Instance Groups (IGs).

  • D. Reboot all VMs during the weekly maintenance window and allow the StartUp Script to download the latest patches from the internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your team needs to make sure that their backend database can only be accessed by the frontend application and no other instances on the network.
How should your team design this network?

A. Create an ingress firewall rule to allow access only from the application to the database using firewall tags

  • B. Create a different subnet for the frontend application and database to ensure network isolation.

  • C. Create two VPC networks, and connect the two networks using Cloud VPN gateways to ensure network isolation.

  • D. Create two VPC networks, and connect the two networks using VPC peering to ensure network isolation.

Hide Solution  Discussion  17

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization receives an increasing number of phishing emails.
Which method should be used to protect employee credentials in this situation?

A. Multifactor Authentication

  • B. A strict password policy

  • C. Captcha on login pages

  • D. Encrypted emails

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A customer is collaborating with another company to build an application on Compute Engine. The customer is building the application tier in their GCP
Organization, and the other company is building the storage tier in a different GCP Organization. This is a 3-tier web application. Communication between portions of the application must not traverse the public internet by any means.
Which connectivity option should be implemented?

A. VPC peering

  • B. Cloud VPN

  • C. Cloud Interconnect

  • D. Shared VPC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your team wants to make sure Compute Engine instances running in your production project do not have public IP addresses. The frontend application Compute
Engine instances will require public IPs. The product engineers have the Editor role to modify resources. Your team wants to enforce this requirement.
How should your team meet these requirements?

  • A. Enable Private Access on the VPC network in the production project.

  • B. Remove the Editor role and grant the Compute Admin IAM role to the engineers.

C. Set up an organization policy to only permit public IPs for the front-end Compute Engine instances

  • D. Set up a VPC network with two subnets: one with public IPs and one without public IPs.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?