Google Professional Cloud Security Engineer Google Cloud Certified – Professional Cloud Security Engineer Online Training
Google Professional Cloud Security Engineer Online Training
The questions for Professional Cloud Security Engineer were last updated at Nov 01,2025.
- Exam Code: Professional Cloud Security Engineer
 - Exam Name: Google Cloud Certified - Professional Cloud Security Engineer
 - Certification Provider: Google
 - Latest update: Nov 01,2025
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.
What should you do?
- A . Use the Cloud Key Management Service to manage a data encryption key (DEK).
 - B . Use the Cloud Key Management Service to manage a key encryption key (KEK).
 - C . Use customer-supplied encryption keys to manage the data encryption key (DEK).
 - D . Use customer-supplied encryption keys to manage the key encryption key (KEK).
 
Validate that the App Engine Default Service Account is the only account that has a role that can write to BigQuery.
Your team wants to limit users with administrative privileges at the organization level.
Which two roles should your team restrict? (Choose two.)
- A . Organization Administrator
 - B . Super Admin
 - C . GKE Cluster Admin
 - D . Compute Admin
 - E . Organization Role Viewer