What should your team do?

A customer has an analytics workload running on Compute Engine that should have limited internet access. Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet. The Compute Engine instances now need to reach out to the public repository to get security updates. What...

January 9, 2024 No Comments READ MORE +

What should you do?

You want data on Compute Engine disks to be encrypted at rest with keys managed by Cloud Key Management Service (KMS). Cloud Identity and Access Management (IAM) permissions to these keys must be managed in a grouped way because the permissions should be the same for all keys. What should...

January 9, 2024 No Comments READ MORE +

Which Google Cloud solution should the organization use to help resolve this concern for the customer while still maintaining data utility?

When working with agents in a support center via online chat, an organization’s customers often share pictures of their documents with personally identifiable information (PII). The organization that owns the support center is concerned that the PII is being stored in their databases as part of the regular chat logs...

January 9, 2024 No Comments READ MORE +

What should you do?

You are the security admin of your company. You have 3,000 objects in your Cloud Storage bucket. You do not want to manage access to each object individually. You also do not want the uploader of an object to always have full control of the object. However, you want to...

January 9, 2024 No Comments READ MORE +

What should you do?

A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs. What should...

January 8, 2024 No Comments READ MORE +

How should you best advise the Systems Engineer to proceed with the least disruption?

A customer’s data science group wants to use Google Cloud Platform (GCP) for their analytics workloads. Company policy dictates that all data must be company-owned and all user authentications must go through their own Security Assertion Markup Language (SAML) 2.0 Identity Provider (IdP). The Infrastructure Operations Systems Engineer was trying...

January 8, 2024 No Comments READ MORE +

Which two log streams would provide the information that the administrator is looking for?

Applications often require access to “secrets” - small pieces of sensitive data at build or run time. The administrator managing these secrets on GCP wants to keep a track of “who did what, where, and when?” within their GCP projects. Which two log streams would provide the information that the...

January 8, 2024 No Comments READ MORE +

Which two steps should the company take to meet these requirements?

A customer has 300 engineers. The company wants to grant different levels of access and efficiently manage IAM permissions between users in the development and production environment projects. Which two steps should the company take to meet these requirements? (Choose two.)A . Create a project with multiple VPC networks for...

January 8, 2024 No Comments READ MORE +

Which options should you recommend to meet the requirements?

In an effort for your company messaging app to comply with FIPS 140-2, a decision was made to use GCP compute and network services. The messaging app architecture includes a Managed Instance Group (MIG) that controls a cluster of Compute Engine instances. The instances use Local SSDs for data caching...

January 8, 2024 No Comments READ MORE +

What technique should the institution use?

A large financial institution is moving its Big Data analytics to Google Cloud Platform. They want to have maximum control over the encryption process of data stored at rest in BigQuery. What technique should the institution use?A . Use Cloud Storage as a federated Data Source.B . Use a Cloud...

January 8, 2024 No Comments READ MORE +