Google's Professional Cloud Security Engineer Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).Which steps should your team take before an incident occurs? (Choose two.) E. Disable the Cloud KMS API.
#301
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization wants to publish yearly reports of your website usage analytics. You must ensure that no data with personally identifiable information (PII) is published by using the Cloud Data Loss Prevention (Cloud DLP) API. Data integrity must be preserved. What should you do?
#302
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your development team is launching a new application. The new application has a microservices architecture on Compute Engine instances and serverless components, including Cloud Functions. This application will process financial transactions that require temporary, highly sensitive data in memory. You need to secure data in use during computations with a focus on minimizing the risk of unauthorized access to memory for this financial application. What should you do?
#303
Answer: A✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You work for a financial organization in a highly regulated industry that is subject to active regulatory compliance. To meet compliance requirements, you need to continuously maintain a specific set of configurations, data residency, organizational policies, and personnel data access controls. What should you do?
#304
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization is worried about recent news headlines regarding application vulnerabilities in production applications that have led to security breaches. You want to automatically scan your deployment pipeline for vulnerabilities and ensure only scanned and verified containers can run in the environment. What should you do?
#305
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer A team at your organization collects logs in an on-premises security information and event management system (SIEM). You must provide a subset of Google Cloud logs for the SIEM, and minimize the risk of data exposure in your cloud environment. What should you do?
#306
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your Google Cloud organization is subdivided into three folders: production, development, and networking, Networking resources for the organization are centrally managed in the networking folder. You discovered that projects in the production folder are attaching to Shared VPCs that are outside of the networking folder which could become a data exfiltration risk. You must resolve the production folder issue without impacting the development folder. You need to use the most efficient and least disruptive approach. What should you do?
#307
Answer: A✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization operates in a highly regulated environment and has a stringent set of compliance requirements for protecting customer data. You must encrypt data while in use to meet regulations. What should you do?
#308
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You are working with a client that is concerned about control of their encryption keys for sensitive data. The client does not want to store encryption keys at rest in the same cloud service provider (CSP) as the data that the keys are encrypting. Which Google Cloud encryption solutions should you recommend to this client?(Choose two.) E. Customer-managed encryption keys
#309
Answer: A✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You want to set up a secure, internal network within Google Cloud for database servers. The servers must not have any direct communication with the public internet. What should you do?
#310
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You work for a large organization that recently implemented a 100GB Cloud Interconnect connection between your Google Cloud and your on-premises edge router. While routinely checking the connectivity, you noticed that the connection is operational but there is an error message that indicates MACsec is operationally down. You need to resolve this error. What should you do?
#311
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You just implemented a Secure Web Proxy instance on Google Cloud for your organization. You were able to reach the internet when you tested this configuration on your test instance. However, developers cannot access the allowed URLs on the Secure Web Proxy instance from their Linux instance on Google Cloud. You want to solve this problem with developers. What should you do?
#312
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You have just created a new log bucket to replace the _Default log bucket. You want to route all log entries that are currently routed to the _Default log bucket to this new log bucket, in the most efficient manner. What should you do?
#313
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You are responsible for a set of Cloud Functions running on your organization's Google Cloud environment. During the last annual security review, secrets were identified in environment variables of some of these Cloud Functions. You must ensure that secrets are identified in a timely manner. What should you do?
#314
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization 1s developing a new SaaS application on Google Cloud. Stringent compliance standards require visibility into privileged account activity, and potentially unauthorized changes and misconfigurations to the application's infrastructure. You need to monitor administrative actions, log changes to IAM roles and permissions, and be able to trace potentially unauthorized configuration changes. What should you do?
#315
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your application development team is releasing a new critical feature. To complete their final testing, they requested 10 thousand real transaction records. The new feature includes format checking on the primary account number (PAN) of a credit card. You must support the request and minimize the risk of unintended personally identifiable information (PII) exposure. What should you do?
#316
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You work for a banking organization. You are migrating sensitive customer data to Google Cloud that is currently encrypted at rest while on-premises. There are strict regulatory requirements when moving sensitive data to the cloud. Independent of the cloud service provider, you must be able to audit key usage and be able to deny certain types of decrypt requests. You must choose an encryption strategy that will ensure robust security and compliance with the regulations. What should you do?
#317
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization is developing an application that will have both corporate and public end-users. You want to centrally manage those customers' identities and authorizations. Corporate end users must access the application by using their corporate user and domain name. What should you do?
#318
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You work for an organization that handles sensitive customer data. You must secure a series of Google Cloud Storage buckets housing this data and meet these requirements:• Multiple teams need varying access levels (some read-only, some read-write).• Data must be protected in storage and at rest.• It's critical to track file changes and audit access for compliance purposes.• For compliance purposes, the organization must have control over the encryption keys.What should you do?
#319
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You are implementing communications restrictions for specific services in your Google Cloud organization. Your data analytics team works in a dedicated folder. You need to ensure that access to BigQuery is controlled for that folder and its projects. The data analytics team must be able to control the restrictions only at the folder level. What should you do?
#320
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization has hired a small, temporary partner team for 18 months. The temporary team will work alongside your DevOps team to develop your organization's application that is hosted on Google Cloud. You must give the temporary partner team access to your application's resources on Google Cloud and ensure that partner employees lose access. If they are removed from their employer's organization. What should you do?
#321
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization heavily utilizes serverless applications while prioritizing security best practices. You are responsible for enforcing image provenance and compliance with security standards before deployment. You leverage Cloud Build as your continuous integration and continuous deployment (CI/CD) tool for building container images. You must configure Binary Authorization to ensure that only images built by your Cloud Build pipeline are deployed and that the images pass security standard compliance checks. What should you do?
#322
Answer: B✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization operates in a highly regulated industry and uses multiple Google Cloud services. You need to identify potential risks to regulatory compliance. Which situation introduces the greatest risk?
#323
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your multinational organization is undergoing rapid expansion within Google Cloud. New teams and projects are added frequently. You are concerned about the potential for inconsistent security policy application and permission sprawl across the organization. You must enforce consistent standards while maintaining the autonomy of regional teams. You need to design a strategy to effectively manage IAM and organization policies at scale, ensuring security and administrative efficiency. What should you do?
#324
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer A security audit uncovered several inconsistencies in your project's Identity and Access Management (IAM) configuration. Some service accounts have overly permissive roles, and a few external collaborators have more access than necessary. You need to gain detailed visibility into changes to IAM policies, user activity, service account behavior, and access to sensitive projects. What should you do?
#325
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You manage multiple internal-only applications that are hosted within different Google Cloud projects. You are deploying a new application that requires external internet access. To maintain security, you want to clearly separate this new application from internal systems. Your solution must have effective security isolation for the new externally-facing application. What should you do?
#326
Answer: D✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You work for an ecommerce company that stores sensitive customer data across multiple Google Cloud regions. The development team has built a new 3-tier application to process orders and must integrate the application into the production environment.You must design the network architecture to ensure strong security boundaries and isolation for the new application, facilitate secure remote maintenance by authorized third-party vendors, and follow the principle of least privilege. What should you do?
#327
Answer: C✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer There is a threat actor that is targeting organizations like yours. Attacks are always initiated from a known IP address range. You want to deny-list those IPs for your website, which is exposed to the internet through an Application Load Balancer. What should you do?
#328
Answer: A✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer Your organization is using Vertex AI Workbench Instances. You must ensure that newly deployed Instances are automatically kept up-to-date and that users cannot accidentally alter settings in the operating system. What should you do?
#329
Answer: A✅ Correct❌ Incorrect
Google's Professional Cloud Security Engineer You must ensure that the keys used for at-rest encryption of your data are compliant with your organization's security controls. One security control mandates that keys get rotated every 90 days. You must implement an effective detection strategy to validate if keys are rotated as required. What should you do?