Which service should be used to accomplish this?

A customer deploys an application to App Engine and needs to check for Open Web Application Security Project (OWASP) vulnerabilities. Which service should be used to accomplish this?A . Cloud Armor B. Google Cloud Audit Logs C. Cloud Security Scanner D. Forseti SecurityView AnswerAnswer: C Explanation: Reference: https://cloud.google.com/security-scanner/

November 2, 2022 No Comments READ MORE +

Which GCP product should the customer implement to meet these requirements?

A customer wants to make it convenient for their mobile workforce to access a CRM web interface that is hosted on Google Cloud Platform (GCP). The CRM can only be accessed by someone on the corporate network. The customer wants to make it available over the internet. Your team requires...

November 2, 2022 No Comments READ MORE +

Which option should you recommend?

You are asked to recommend a solution to store and retrieve sensitive configuration data from an application that runs on Compute Engine. Which option should you recommend?A . Cloud Key Management Service B. Compute Engine guest attributes C. Compute Engine custom metadata D. Secret ManagerView AnswerAnswer: A Explanation: Reference: https://www.freecodecamp.org/news/google-cloud-platform-from-zero-to-hero/

November 2, 2022 No Comments READ MORE +

Which Google Cloud product should you use?

You manage your organization's Security Operations Center (SOC). You currently monitor and detect network traffic anomalies in your Google Cloud VPCs based on packet header information. However, you want the capability to explore network flows and their payload to aid investigations. Which Google Cloud product should you use?A . Marketplace...

November 2, 2022 No Comments READ MORE +

What should you do?

You want to update your existing VPC Service Controls perimeter with a new access level. You need to avoid breaking the existing perimeter with this change, and ensure the least disruptions to users while minimizing overhead. What should you do?A . Create an exact replica of your existing perimeter. Add...

November 1, 2022 No Comments READ MORE +

Which two settings must remain disabled to meet these requirements?

Your team needs to make sure that a Compute Engine instance does not have access to the internet or to any Google APIs or services. Which two settings must remain disabled to meet these requirements? (Choose two.)A . Public IP B. IP Forwarding C. Private Google Access D. Static routes...

November 1, 2022 No Comments READ MORE +

How should you configure the network?

You need to set up a Cloud interconnect connection between your company's on-premises data center and VPC host network. You want to make sure that on-premises applications can only access Google APIs over the Cloud Interconnect and not through the public internet. You are required to only use APIs that...

November 1, 2022 No Comments READ MORE +

How should the organization achieve this objective?

For compliance reasons, an organization needs to ensure that in-scope PCI Kubernetes Pods reside on “in- scope” Nodes only. These Nodes can only contain the “in-scope” Pods. How should the organization achieve this objective?A . Add a nodeSelector field to the pod configuration to only use the Nodes labeled inscope:...

November 1, 2022 No Comments READ MORE +

What should you do?

You need to follow Google-recommended practices to leverage envelope encryption and encrypt data at the application layer. What should you do?A . Generate a data encryption key (DEK) locally to encrypt the data, and generate a new key encryption key (KEK) in Cloud KMS to encrypt the DEK. Store both...

November 1, 2022 No Comments READ MORE +

Which Google Cloud solution should the organization use to help resolve this concern for the customer while still maintaining data utility?

When working with agents in a support center via online chat, an organization’s customers often share pictures of their documents with personally identifiable information (PII). The organization that owns the support center is concerned that the PII is being stored in their databases as part of the regular chat logs...

November 1, 2022 No Comments READ MORE +