Which type of networking design should your team use to meet these requirements?

Your team needs to configure their Google Cloud Platform (GCP) environment so they can centralize the control over networking resources like firewall rules, subnets, and routes. They also have an on-premises environment where resources need access back to the GCP resources through a private VPN connection. The networking resources will...

January 12, 2024 No Comments READ MORE +

Which solution meets the organization's requirements?

An organization is evaluating the use of Google Cloud Platform (GCP) for certain IT workloads. A well-established directory service is used to manage user identities and lifecycle management. This directory service must continue for the organization to use as the “source of truth” directory for identities. Which solution meets the...

January 11, 2024 No Comments READ MORE +

How should the customer ensure authenticated network separation between the different tiers of the application?

A customer wants to deploy a large number of 3-tier web applications on Compute Engine. How should the customer ensure authenticated network separation between the different tiers of the application?A . Run each tier in its own Project, and segregate using Project labels.B . Run each tier with a different...

January 11, 2024 No Comments READ MORE +

What should you do?

Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process. What should you do?A . Use the Cloud Key Management Service to manage a data encryption key (DEK).B . Use the Cloud Key Management Service to manage a...

January 11, 2024 No Comments READ MORE +

What should you do?

Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process. What should you do?A . Use the Cloud Key Management Service to manage a data encryption key (DEK).B . Use the Cloud Key Management Service to manage a...

January 11, 2024 No Comments READ MORE +

What should you do?

Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process. What should you do?A . Use the Cloud Key Management Service to manage a data encryption key (DEK).B . Use the Cloud Key Management Service to manage a...

January 11, 2024 No Comments READ MORE +

Which option meets the requirement of your team?

An application running on a Compute Engine instance needs to read data from a Cloud Storage bucket. Your team does not allow Cloud Storage buckets to be globally readable and wants to ensure the principle of least privilege. Which option meets the requirement of your team?A . Create a Cloud...

January 11, 2024 No Comments READ MORE +

Which Google Cloud Service should be used to achieve this?

A retail customer allows users to upload comments and product reviews. The customer needs to make sure the text does not include sensitive data before the comments or reviews are published. Which Google Cloud Service should be used to achieve this?A . Cloud Key Management ServiceB . Cloud Data Loss...

January 10, 2024 No Comments READ MORE +

Validate that the App Engine Default Service Account is the only account that has a role that can write to BigQuery.

Validate that the App Engine Default Service Account is the only account that has a role that can write to BigQuery.View AnswerAnswer: A

January 10, 2024 No Comments READ MORE +

What should you do?

You are in charge of migrating a legacy application from your company datacenters to GCP before the current maintenance contract expires. You do not know what ports the application is using and no documentation is available for you to check. You want to complete the migration without putting your environment...

January 10, 2024 No Comments READ MORE +