What should you do?

You need to centralize your team’s logs for production projects. You want your team to be able to search and analyze the logs using Logs Explorer. What should you do?A . Enable Cloud Monitoring workspace, and add the production projects to be monitored. B. Use Logs Explorer at the organization...

November 1, 2022No CommentsREAD MORE +

Which logs should the database administrator review?

A database administrator notices malicious activities within their Cloud SQL instance. The database administrator wants to monitor the API calls that read the configuration or metadata of resources. Which logs should the database administrator review?A . Admin Activity B. System Event C. Access Transparency D. Data AccessView AnswerAnswer: C

November 1, 2022No CommentsREAD MORE +

Which Google Cloud service should you use?

Your organization has had a few recent DDoS attacks. You need to authenticate responses to domain name lookups. Which Google Cloud service should you use?A . Cloud DNS with DNSSEC B. Cloud NAT C. HTTP(S) Load Balancing D. Google Cloud ArmorView AnswerAnswer: A Explanation: Reference: https://developers.google.com/speed/public-dns/faq

October 31, 2022No CommentsREAD MORE +

How should you accomplish this?

You are setting up a CI/CD pipeline to deploy containerized applications to your production clusters on Google Kubernetes Engine (GKE). You need to prevent containers with known vulnerabilities from being deployed. You have the following requirements for your solution: Must be cloud-native Must be cost-efficient Minimize operational overhead How should...

October 31, 2022No CommentsREAD MORE +

Which two actions should you take when creating the super administrator accounts?

You are in charge of creating a new Google Cloud organization for your company. Which two actions should you take when creating the super administrator accounts? (Choose two.)A . Create an access level in the Google Admin console to prevent super admin from logging in to Google Cloud. B. Disable...

October 31, 2022No CommentsREAD MORE +

What should you do?

You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account. What should you do?A . Query Data Access logs. B. Query Admin Activity logs. C. Query Access Transparency logs. D. Query Stackdriver Monitoring Workspace.View...

October 31, 2022No CommentsREAD MORE +

What should you do?

You work for an organization in a regulated industry that has strict data protection requirements. The organization backs up their data in the cloud. To comply with data privacy regulations, this data can only be stored for a specific length of time and must be deleted after this specific period....

October 31, 2022No CommentsREAD MORE +

How should the customer achieve this using Google Cloud Platform?

A customer needs an alternative to storing their plain text secrets in their source-code management (SCM) system. How should the customer achieve this using Google Cloud Platform?A . Use Cloud Source Repositories, and store secrets in Cloud SQL. B. Encrypt the secrets with a Customer-Managed Encryption Key (CMEK), and store...

October 30, 2022No CommentsREAD MORE +

What should you do?

You are troubleshooting access denied errors between Compute Engine instances connected to a Shared VPC and BigQuery datasets. The datasets reside in a project protected by a VPC Service Controls perimeter. What should you do?A . Add the host project containing the Shared VPC to the service perimeter. B. Add...

October 29, 2022No CommentsREAD MORE +