Which Google 2SV option should you use?

You have noticed an increased number of phishing attacks across your enterprise user accounts. You want to implement the Google 2-Step Verification (2SV) option that uses a cryptographic signature to authenticate a user and verify the URL of the login page. Which Google 2SV option should you use?A . Titan...

October 21, 2022 No Comments READ MORE +

What should you do?

Your organization’s Google Cloud VMs are deployed via an instance template that configures them with a public IP address in order to host web services for external users. The VMs reside in a service project that is attached to a host (VPC) project containing one custom Shared VPC for the...

October 21, 2022 No Comments READ MORE +

Which Google 2SV option should you use?

You have noticed an increased number of phishing attacks across your enterprise user accounts. You want to implement the Google 2-Step Verification (2SV) option that uses a cryptographic signature to authenticate a user and verify the URL of the login page. Which Google 2SV option should you use?A . Titan...

October 20, 2022 No Comments READ MORE +

What should you do?

You have been tasked with inspecting IP packet data for invalid or malicious content. What should you do?A . Use Packet Mirroring to mirror traffic to and from particular VM instances. Perform inspection using security software that analyzes the mirrored traffic. B. Enable VPC Flow Logs for all subnets in...

October 20, 2022 No Comments READ MORE +

Which organization-level policy constraint should you enable?

You want to prevent users from accidentally deleting a Shared VPC host project . Which organization-level policy constraint should you enable?A . compute.restrictSharedVpcHostProjectsB . compute.restrictXpnProjectLienRemovalC . compute.restrictSharedVpcSubnetworksD . compute.sharedReservationsOwnerProjectsView AnswerAnswer: B Explanation: Reference: https://cloud.google.com/vpc/docs/provisioning-shared-vpc

April 1, 2022 No Comments READ MORE +

Which boot disk encryption solution should you use on the cluster to meet this customer’s requirements?

A customer wants to move their sensitive workloads to a Compute Engine-based cluster using Managed Instance Groups (MIGs). The jobs are bursty and must be completed quickly. They have a requirement to be able to manage and rotate the encryption keys. Which boot disk encryption solution should you use on...

March 31, 2022 No Comments READ MORE +

What should you do?

You will create a new Service Account that should be able to list the Compute Engine instances in the project. You want to follow Google-recommended practices. What should you do?A . Create an Instance Template, and allow the Service Account Read Only access for the Compute Engine Access Scope.B ....

March 31, 2022 No Comments READ MORE +

What should you do?

You will create a new Service Account that should be able to list the Compute Engine instances in the project. You want to follow Google-recommended practices. What should you do?A . Create an Instance Template, and allow the Service Account Read Only access for the Compute Engine Access Scope.B ....

March 31, 2022 No Comments READ MORE +

Configure private access using the restricted.googleapis.com domains in on-premises DNS configurations.

Configure private access using the restricted.googleapis.com domains in on-premises DNS configurations.View AnswerAnswer: C

March 30, 2022 No Comments READ MORE +

Which cost reduction options should you recommend?

As adoption of the Cloud Data Loss Prevention (DLP) API grows within the company, you need to optimize usage to reduce cost. DLP target data is stored in Cloud Storage and BigQuery. The location and region are identified as a suffix in the resource name. Which cost reduction options should...

March 30, 2022 No Comments READ MORE +