Study Online Professional Cloud Security Engineer Exam Dumps to Pass

Category:

Comments:

Post Date:


Professional Cloud Security Engineer dumps questions can help you identify areas where you need to focus your studies. As you answer questions, you will be able to see which topics you are comfortable with and which ones you need to spend more time studying. Google Professional Cloud Security Engineer dumps questions provide realistic practice for the certification exam. Professional Cloud Security Engineer dumps are designed to simulate the actual exam environment, and they will give you a chance to practice answering questions under time pressure. Study free Google Professional Cloud Security Engineer online dumps below.

Page 1 of 7

1. A company has redundant mail servers in different Google Cloud Platform regions and wants to route customers to the nearest mail server based on location.

How should the company accomplish this?

2. Your company’s cloud security policy dictates that VM instances should not have an external IP address. You need to identify the Google Cloud service that will allow VM instances without external IP addresses to connect to the internet to update the VMs.

Which service should you use?

3. A customer needs an alternative to storing their plain text secrets in their source-code management (SCM) system.

How should the customer achieve this using Google Cloud Platform?

4. You are working with a client that is concerned about control of their encryption keys for sensitive data. The client does not want to store encryption keys at rest in the same cloud service provider (CSP) as the data that the keys are encrypting.

Which Google Cloud encryption solutions should you recommend to this client? (Choose two.)

5. You are migrating an on-premises data warehouse to BigQuery Cloud SQL, and Cloud Storage. You need to configure security services in the data warehouse.

Your company compliance policies mandate that the data warehouse must:

• Protect data at rest with full lifecycle management on cryptographic keys

• Implement a separate key management provider from data management

• Provide visibility into all encryption key requests

What services should be included in the data warehouse implementation? Choose 2 answers

6. You are the Security Admin in your company. You want to synchronize all security groups that have an email address from your LDAP directory in Cloud IAM.

What should you do?

7. Your company is using Cloud Dataproc for its Spark and Hadoop jobs. You want to be able to create, rotate, and destroy symmetric encryption keys used for the persistent disks used by Cloud Dataproc. Keys can be stored in the cloud.

What should you do?

8. A customer’s company has multiple business units. Each business unit operates independently, and each has their own engineering group. Your team wants visibility into all projects created within the company and wants to organize their Google Cloud Platform (GCP) projects based on different business units. Each business unit also requires separate sets of IAM permissions.

Which strategy should you use to meet these needs?

9. A company’s application is deployed with a user-managed Service Account key. You want to use Google- recommended practices to rotate the key.

What should you do?

10. You are a security administrator at your company and are responsible for managing access controls (identification, authentication, and authorization) on Google Cloud.

Which Google-recommended best practices should you follow when configuring authentication and authorization? (Choose two.)


 

TAGS:

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Related

Posts