When creating a secure container image, which two items should you incorporate into the build if possible? (Choose two.)

When creating a secure container image, which two items should you incorporate into the build if possible? (Choose two.)A . Ensure that the app does not run as PID 1.B . Package a single app as a container.C . Remove any unnecessary tools not needed by the app.D . Use...

February 5, 2020 No Comments READ MORE +

How should the customer achieve this using Google Cloud Platform?

A customer needs an alternative to storing their plain text secrets in their source-code management (SCM) system. How should the customer achieve this using Google Cloud Platform?A . Use Cloud Source Repositories, and store secrets in Cloud SQC . Encrypt the secrets with a Customer-Managed Encryption Key (CMEK), and store...

February 5, 2020 No Comments READ MORE +

Which type of access should your team grant to meet this requirement?

A business unit at a multinational corporation signs up for GCP and starts moving workloads into GCP. The business unit creates a Cloud Identity domain with an organizational resource that has hundreds of projects. Your team becomes aware of this and wants to take over managing permissions and auditing the...

February 3, 2020 No Comments READ MORE +

What should they do?

Your company has decided to make a major revision of their API in order to create better experiences for their developers. They need to keep the old version of the API available and deployable, while allowing new customers and testers to try out the new API. They want to keep...

February 3, 2020 No Comments READ MORE +

What should you do?

A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs. What should...

February 3, 2020 No Comments READ MORE +

What should you do?

A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs. What should...

February 1, 2020 No Comments READ MORE +

How should you best advise the Systems Engineer to proceed with the least disruption?

A customer’s data science group wants to use Google Cloud Platform (GCP) for their analytics workloads. Company policy dictates that all data must be company-owned and all user authentications must go through their own Security Assertion Markup Language (SAML) 2.0 Identity Provider (IdP). The Infrastructure Operations Systems Engineer was trying...

February 1, 2020 No Comments READ MORE +

How should you advise this organization?

An organization’s typical network and security review consists of analyzing application transit routes, request handling, and firewall rules. They want to enable their developer teams to deploy new applications without the overhead of this full review. How should you advise this organization?A . Use Forseti with Firewall filters to catch...

January 29, 2020 No Comments READ MORE +

Which two approaches can you take to meet the requirements?

A company is running workloads in a dedicated server room. They must only be accessed from within the private company network. You need to connect to these workloads from Compute Engine instances within a Google Cloud Platform project. Which two approaches can you take to meet the requirements? (Choose two.)A...

January 22, 2020 No Comments READ MORE +

What should you do?

A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs. What should...

January 22, 2020 No Comments READ MORE +