What should you do?

You want data on Compute Engine disks to be encrypted at rest with keys managed by Cloud Key Management Service (KMS). Cloud Identity and Access Management (IAM) permissions to these keys must be managed in a grouped way because the permissions should be the same for all keys. What should you...

June 13, 2021 No Comments READ MORE +

What should you do to meet these requirements?

A company allows every employee to use Google Cloud Platform. Each department has a Google Group, with all department members as group members. If a department member creates a new project, all members of that department should automatically have read-only access to all new project resources. Members of any other...

June 12, 2021 No Comments READ MORE +

Where should you export the logs?

A manager wants to start retaining security event logs for 2 years while minimizing costs. You write a filter to select the appropriate log entries. Where should you export the logs?A . BigQuery datasetsB . Cloud Storage bucketsC . StackDriver loggingD . Cloud Pub/Sub topicsView AnswerAnswer: B Explanation: Reference: https://cloud.google.com/logging/docs/exclusions

June 11, 2021 No Comments READ MORE +

What should you do?

Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process. What should you do?A . Use the Cloud Key Management Service to manage a data encryption key (DEK).B . Use the Cloud Key Management Service to manage a key...

June 10, 2021 No Comments READ MORE +

Which boot disk encryption solution should you use on the cluster to meet this customers requirements?

A customer wants to move their sensitive workloads to a Compute Engine-based cluster using Managed Instance Groups (MIGs). The jobs are bursty and must be completed quickly. They have a requirement to be able to manage and rotate the encryption keys. Which boot disk encryption solution should you use on the...

June 9, 2021 No Comments READ MORE +

What should you do?

While migrating your organizations infrastructure to GCP, a large number of users will need to access GCP Console. The Identity Management team already has a well-established way to manage your users and want to keep using your existing Active Directory or LDAP server along with the existing SSO password. What should...

June 9, 2021 No Comments READ MORE +

What should you do?

A companys application is deployed with a user-managed Service Account key. You want to use Google- recommended practices to rotate the key. What should you do?A . Open Cloud Shell and run gcloud iam service-accounts enable-auto-rotate --iam-account=IAM_ACCOUNC . Open Cloud Shell and run gcloud iam service-accounts keys rotate --iam-account=IAM_ACCOUNT --key=NEW_KEE ....

June 9, 2021 No Comments READ MORE +

Which Cloud Data Loss Prevention API technique should you use to accomplish this?

An employer wants to track how bonus compensations have changed over time to identify employee outliers and correct earning disparities. This task must be performed without exposing the sensitive compensation data for any individual and must be reversible to identify the outlier. Which Cloud Data Loss Prevention API technique should...

February 14, 2020 No Comments READ MORE +

Which option meets the requirement of your team?

An application running on a Compute Engine instance needs to read data from a Cloud Storage bucket. Your team does not allow Cloud Storage buckets to be globally readable and wants to ensure the principle of least privilege. Which option meets the requirement of your team?A . Create a Cloud...

February 13, 2020 No Comments READ MORE +

What should the customer do to meet these requirements?

A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team wants to add a security layer so that the ERP systems only accept traffic from Cloud Identity-Aware Proxy. What should the customer do to meet these requirements?A . Make sure that the ERP...

February 13, 2020 No Comments READ MORE +