최신 Professional-Cloud-Security-Engineer 무료덤프 - Google Cloud Certified - Professional Cloud Security Engineer
An organization receives an increasing number of phishing emails.
Which method should be used to protect employee credentials in this situation?
Which method should be used to protect employee credentials in this situation?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
You need to set up a Cloud interconnect connection between your company's on-premises data center and VPC host network. You want to make sure that on- premises applications can only access Google APIs over the Cloud Interconnect and not through the public internet. You are required to only use APIs that are supported by VPC Service Controls to mitigate against exfiltration risk to non-supported APIs. How should you configure the network?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
You are responsible for managing your company's identities in Google Cloud. Your company enforces 2-Step Verification (2SV) for all users. You need to reset a user's access, but the user lost their second factor for 2SV. You want to minimize risk. What should you do?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Your organization acquired a new workload. The Web and Application (App) servers will be running on Compute Engine in a newly created custom VPC. You are responsible for configuring a secure network communication solution that meets the following requirements:
- Only allows communication between the Web and App tiers.
- Enforces consistent network security when autoscaling the Web and App tiers.
- Prevents Compute Engine Instance Admins from altering network traffic.
What should you do?
- Only allows communication between the Web and App tiers.
- Enforces consistent network security when autoscaling the Web and App tiers.
- Prevents Compute Engine Instance Admins from altering network traffic.
What should you do?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Developers in an organization are prototyping a few applications on Google Cloud Platform (GCP) and are starting to store sensitive information on GCP. The developers are using their personal/consumer Gmail accounts to set up and manage their projects within GCP. A security engineer identifies this practice as a concern to the organization management because of the lack of centralized project management and access to the data being stored in these accounts.
Which solution should be used to resolve this concern?
Which solution should be used to resolve this concern?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
You are a security engineer at a finance company. Your organization plans to store data on Google Cloud, but your leadership team is worried about the security of their highly sensitive data. Specifically, your company is concerned about internal Google employees' ability to access your company's data on Google Cloud.
What solution should you propose?
What solution should you propose?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
You are implementing data protection by design and in accordance with GDPR requirements. As part of design reviews, you are told that you need to manage the encryption key for a solution that includes workloads for Compute Engine, Google Kubernetes Engine, Cloud Storage, BigQuery, and Pub/Sub. Which option should you choose for this implementation?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Your organization wants to be compliant with the General Data Protection Regulation (GDPR) on Google Cloud. You must implement data residency and operational sovereignty in the EU.
What should you do? (Choose two.)
What should you do? (Choose two.)
정답: C,D
설명: (DumpTOP 회원만 볼 수 있음)
You are exporting application logs to Cloud Storage. You encounter an error message that the log sinks don't support uniform bucket-level access policies. How should you resolve this error?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.
What should you do?
What should you do?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Your Google Cloud organization allows for administrative capabilities to be distributed to each team through provision of a Google Cloud project with Owner role (roles/owner). The organization contains thousands of Google Cloud projects. Security Command Center Premium has surfaced multiple OPEN_MYSQL_PORT findings. You are enforcing the guardrails and need to prevent these types of common misconfigurations.
What should you do?
What should you do?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
You are asked to recommend a solution to store and retrieve sensitive configuration data from an application that runs on Compute Engine. Which option should you recommend?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Your customer has an on-premises Public Key Infrastructure (PKI) with a certificate authority (CA).
You need to issue certificates for many HTTP load balancer frontends.
The on-premises PKI should be minimally affected due to many manual processes, and the solution needs to scale.
What should you do?
You need to issue certificates for many HTTP load balancer frontends.
The on-premises PKI should be minimally affected due to many manual processes, and the solution needs to scale.
What should you do?
정답: B
A security team at an e-commerce company wants to define an automatic incident response process for fraudulent credit card usage attempts. The team targets a 10-minute or faster response time for such incidents. The fraudulent card list is updated every 60 seconds. The e- commerce servers log the transaction details in near-real time. Which option should you recommend to the security team?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
You need to enable VPC Service Controls and allow changes to perimeters in existing environments without preventing access to resources. Which VPC Service Controls mode should you use?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Your company requires the security and network engineering teams to identify all network anomalies within and across VPCs, internal traffic from VMs to VMs, traffic between end locations on the internet and VMs, and traffic between VMs to Google Cloud services in production. Which method should you use?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A customer has an analytics workload running on Compute Engine that should have limited internet access.
Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.
The Compute Engine instances now need to reach out to the public repository to get security updates.
What should your team do?
Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.
The Compute Engine instances now need to reach out to the public repository to get security updates.
What should your team do?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A company is backing up application logs to a Cloud Storage bucket shared with both analysts and the administrator. Analysts should only have access to logs that do not contain any personally identifiable information (PII). Log files containing PII should be stored in another bucket that is only accessible by the administrator.
What should you do?
What should you do?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An organization recently began using App Engine to build and host its new web application for its customers. The organization wants to use its existing IAM setup to allow its developer employees to have elevated access to the application remotely. This would allow them to push updates and fixes to the application via an HTTPS connection. Non-developer employees should only get access to the production version without development permissions. Which Google Cloud Platform solution should be used to meet these requirements?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Your organization is using GitHub Actions as a continuous integration and delivery (CI/CD) platform. You must enable access to Google Cloud resources from the CI/CD pipelines in the most secure way.
What should you do?
What should you do?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)