Q: 11
You have numerous private virtual machines on Google Cloud. You occasionally need to manage the
servers through Secure Socket Shell (SSH) from a remote location. You want to configure remote
access to the servers in a manner that optimizes security and cost efficiency.
What should you do?
Options
Discussion
It’s C. Would the answer change if the requirement was to enable access from anywhere, not just your corporate network?
Be respectful. No spam.
Q: 12
A company’s application is deployed with a user-managed Service Account key. You want to use
Google- recommended practices to rotate the key.
What should you do?
Options
Discussion
D tbh, since storing the old key as backup sounds safer in case the new one fails. Similar question came up in practice and it seemed logical, but now not fully sure if Google likes that. Nice clear scenario.
Be respectful. No spam.
Q: 13
A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine.
Their security team wants to add a security layer so that the ERP systems only accept traffic from
Cloud Identity- Aware Proxy.
What should the customer do to meet these requirements?
Options
Discussion
Option A
Be respectful. No spam.
Q: 14
A customer has an analytics workload running on Compute Engine that should have limited internet
access.
Your team created an egress firewall rule to deny (priority 1000) all traffic to the internet.
The Compute Engine instances now need to reach out to the public repository to get security
updates. What should your team do?
Options
Discussion
Its A, but does "limited internet access" mean certain URLs only? In some exam guides they mention using CIDR instead of hostnames, so if the repository changed to an IP address requirement, would D be better? Would check official doc examples too.
Be respectful. No spam.
Q: 15
An organization receives an increasing number of phishing emails.
Which method should be used to protect employee credentials in this situation?
Options
Discussion
Maybe D here. If emails are encrypted, attackers can't read their contents or steal credentials through phishing messages. I saw a similar question in a practice test and encrypted email was listed as a control. Not totally sure, open to corrections.
Be respectful. No spam.
Q: 16
A customer’s company has multiple business units. Each business unit operates independently, and
each has their own engineering group. Your team wants visibility into all projects created within the
company and wants to organize their Google Cloud Platform (GCP) projects based on different
business units. Each business unit also requires separate sets of IAM permissions.
Which strategy should you use to meet these needs?
Options
Discussion
A makes more sense here. Labels in C can help track ownership but don't give you the IAM separation across business units. Using folders under the org node lets you apply policies at the right level and keep things organized. Pretty sure that's Google's recommended way.
GCP org structure is so convoluted sometimes. Its C, using labels to tag projects for units.
Be respectful. No spam.
Q: 17
A company is running workloads in a dedicated server room. They must only be accessed from within
the private company network. You need to connect to these workloads from Compute Engine
instances within a Google Cloud Platform project.
Which two approaches can you take to meet the requirements? (Choose two.)
Options
Discussion
Option AB, not C. I thought Shared VPC helps with access between projects so it might apply here.
C or A. Both create a secure link from GCP to on-prem workloads so they fit the use case. B, D, and E don't really connect to physical server rooms directly. Pretty sure it's AC but open to other takes if I missed something.
Be respectful. No spam.
Q: 18
You control network traffic for a folder in your Google Cloud environment. Your folder includes
multiple projects and Virtual Private Cloud (VPC) networks You want to enforce on the folder level
that egress connections are limited only to IP range 10.58.5.0/24 and only from the VPC network
dev-vpc." You want to minimize implementation and maintenance effort
What should you do?
Options
Discussion
Option B Similar question came up in official practice and it points to using a hierarchical firewall policy for this scenario.
Be respectful. No spam.
Q: 19
You are creating an internal App Engine application that needs to access a user’s Google Drive on the
user’s behalf. Your company does not want to rely on the current user’s credentials. It also wants to
follow Google- recommended practices.
What should you do?
Options
Discussion
D imo, since domain-wide delegation with a service account lets the app act on behalf of users without needing their actual creds. That's what Google suggests for these internal use cases. Not totally certain but this matches docs I've seen.
Be respectful. No spam.
Q: 20
You are a consultant for an organization that is considering migrating their data from its private cloud
to Google Cloud. The organization’s compliance team is not familiar with Google Cloud and needs
guidance on how compliance requirements will be met on Google Cloud. One specific compliance
requirement is for customer data at rest to reside within specific geographic boundaries. Which
option should you recommend for the organization to meet their data residency requirements on
Google Cloud?
Options
Discussion
Org Policy Service constraints are your best bet here, so A. You can actually enforce data location policies at the org level with this, which checks that compliance box. Not totally sure if there’s another way, but this is what I’d recommend.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2