Google Cloud Security Engineer
Q: 1
Your application is deployed as a highly available cross-region solution behind a global external
HTTP(S) load balancer. You notice significant spikes in traffic from multiple IP addresses but it is
unknown whether the IPs are malicious. You are concerned about your application's availability. You
want to limit traffic from these clients over a specified time interval.
What should you do?
Options
Q: 2
You are asked to recommend a solution to store and retrieve sensitive configuration data from an
application that runs on Compute Engine. Which option should you recommend?
Options
Q: 3
An organization adopts Google Cloud Platform (GCP) for application hosting services and needs
guidance on setting up password requirements for their Cloud Identity account. The organization has
a password policy requirement that corporate employee passwords must have a minimum number
of characters.
Which Cloud Identity password guidelines can the organization use to inform their new
requirements?
Options
Q: 4
Your organization uses a microservices architecture based on Google Kubernetes Engine (GKE).
Security reviews recommend tighter controls around deployed container images to reduce potential
vulnerabilities and maintain compliance. You need to implement an automated system by using
managed services to ensure that only approved container images are deployed to the GKE clusters.
What should you do?
Options
Q: 5
Applications often require access to “secrets” - small pieces of sensitive data at build or run time. The
administrator managing these secrets on GCP wants to keep a track of “who did what, where, and
when?” within their GCP projects.
Which two log streams would provide the information that the administrator is looking for? (Choose
two.)
Options
Q: 6
You are in charge of migrating a legacy application from your company datacenters to GCP before the
current maintenance contract expires. You do not know what ports the application is using and no
documentation is available for you to check. You want to complete the migration without putting
your environment at risk.
What should you do?
Options
Q: 7
You work for an organization in a regulated industry that has strict data protection requirements. The
organization backs up their data in the cloud. To comply with data privacy regulations, this data can
only be stored for a specific length of time and must be deleted after this specific period.
You want to automate the compliance with this regulation while minimizing storage costs. What
should you do?
Options
Q: 8
An organization is migrating from their current on-premises productivity software systems to G Suite.
Some network security controls were in place that were mandated by a regulatory body in their
region for their previous on-premises system. The organization’s risk team wants to ensure that
network security controls are maintained and effective in G Suite. A security architect supporting this
migration has been asked to ensure that network security controls are in place as part of the new
shared responsibility model between the organization and Google Cloud.
What solution would help meet the requirements?
Options
Q: 9
You need to follow Google-recommended practices to leverage envelope encryption and encrypt
data at the application layer.
What should you do?
Options
Q: 10
A batch job running on Compute Engine needs temporary write access to a Cloud Storage bucket.
You want the batch job to use the minimum permissions necessary to complete the task. What
should you do?
Options
Question 1 of 10