Exam Details

  • Exam Code
    :PROFESSIONAL-CLOUD-SECURITY-ENGINEER
  • Exam Name
    :Professional Cloud Security Engineer
  • Certification
    :Google Certifications
  • Vendor
    :Google
  • Total Questions
    :244 Q&As
  • Last Updated
    :May 19, 2025

Google Google Certifications PROFESSIONAL-CLOUD-SECURITY-ENGINEER Questions & Answers

  • Question 131:

    Last week, a company deployed a new App Engine application that writes logs to BigQuery. No other workloads are running in the project. You need to validate that all data written to BigQuery was done using the App Engine Default Service Account.

    What should you do?

    A. 1. Use StackDriver Logging and filter on BigQuery Insert Jobs. 2.Click on the email address in line with the App Engine Default Service Account in the authentication field. 3.Click Hide Matching Entries. 4.Make sure the resulting list is empty.

    B. 1. Use StackDriver Logging and filter on BigQuery Insert Jobs. 2.Click on the email address in line with the App Engine Default Service Account in the authentication field. 3.Click Show Matching Entries. 4.Make sure the resulting list is empty.

    C. 1. In BigQuery, select the related dataset.

    2. Make sure the App Engine Default Service Account is the only account that can write to the dataset.

    D. 1. Go to the IAM section on the project.

    2. Validate that the App Engine Default Service Account is the only account that has a role that can write to BigQuery.

  • Question 132:

    Your company requires the security and network engineering teams to identify all network anomalies within and across VPCs, internal traffic from VMs to VMs, traffic between end locations on the internet and VMs, and traffic between VMs to Google Cloud services in production. Which method should you use?

    A. Define an organization policy constraint.

    B. Configure packet mirroring policies.

    C. Enable VPC Flow Logs on the subnet.

    D. Monitor and analyze Cloud Audit Logs.

  • Question 133:

    You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account. What should you do?

    A. Query Data Access logs.

    B. Query Admin Activity logs.

    C. Query Access Transparency logs.

    D. Query Stackdriver Monitoring Workspace.

  • Question 134:

    You have been tasked with inspecting IP packet data for invalid or malicious content. What should you do?

    A. Use Packet Mirroring to mirror traffic to and from particular VM instances. Perform inspection using security software that analyzes the mirrored traffic.

    B. Enable VPC Flow Logs for all subnets in the VPC. Perform inspection on the Flow Logs data using Cloud Logging.

    C. Configure the Fluentd agent on each VM Instance within the VPC. Perform inspection on the log data using Cloud Logging.

    D. Configure Google Cloud Armor access logs to perform inspection on the log data.

  • Question 135:

    Your company recently published a security policy to minimize the usage of service account keys. On- premises Windows-based applications are interacting with Google Cloud APIs. You need to implement Workload Identity Federation (WIF) with your identity provider on-premises.

    What should you do?

    A. Set up a workload identity pool with your corporate Active Directory Federation Service (ADFS) Configure a rule to let principals in the pool impersonate the Google Cloud service account.

    B. Set up a workload identity pool with your corporate Active Directory Federation Service (ADFS) Let all principals in the pool impersonate the Google Cloud service account.

    C. Set up a workload identity pool with an OpenID Connect (OIDC) service on the name machine Configure a rule to let principals in the pool impersonate the Google Cloud service account.

    D. Set up a workload identity pool with an OpenID Connect (OIDC) service on the same machine Let all principals in the pool impersonate the Google Cloud service account.

  • Question 136:

    When working with agents in a support center via online chat, an organization's customers often share pictures of their documents with personally identifiable information (PII). The organization that owns the support center is concerned that the PII is being stored in their databases as part of the regular chat logs they retain for review by internal or external analysts for customer service trend analysis.

    Which Google Cloud solution should the organization use to help resolve this concern for the customer while still maintaining data utility?

    A. Use Cloud Key Management Service (KMS) to encrypt the PII data shared by customers before storing it for analysis.

    B. Use Object Lifecycle Management to make sure that all chat records with PII in them are discarded and not saved for analysis.

    C. Use the image inspection and redaction actions of the DLP API to redact PII from the images before storing them for analysis.

    D. Use the generalization and bucketing actions of the DLP API solution to redact PII from the texts before storing them for analysis.

  • Question 137:

    Which two implied firewall rules are defined on a VPC network? (Choose two.)

    A. A rule that allows all outbound connections

    B. A rule that denies all inbound connections

    C. A rule that blocks all inbound port 25 connections

    D. A rule that blocks all outbound connections

    E. A rule that allows all inbound port 80 connections

  • Question 138:

    Your organization acquired a new workload. The Web and Application (App) servers will be running on Compute Engine in a newly created custom VPC. You are responsible for configuring a secure network communication solution that

    meets the following requirements:

    Only allows communication between the Web and App tiers.

    Enforces consistent network security when autoscaling the Web and App tiers.

    Prevents Compute Engine Instance Admins from altering network traffic.

    What should you do?

    A. 1. Configure all running Web and App servers with respective network tags.

    2. Create an allow VPC firewall rule that specifies the target/source with respective network tags.

    B. 1. Configure all running Web and App servers with respective service accounts.

    2. Create an allow VPC firewall rule that specifies the target/source with respective service accounts.

    C. 1. Re-deploy the Web and App servers with instance templates configured with respective network tags.

    2. Create an allow VPC firewall rule that specifies the target/source with respective network tags.

    D. 1. Re-deploy the Web and App servers with instance templates configured with respective service accounts.

    2. Create an allow VPC firewall rule that specifies the target/source with respective service accounts.

  • Question 139:

    You need to provide a corporate user account in Google Cloud for each of your developers and operational staff who need direct access to GCP resources. Corporate policy requires you to maintain the user identity in a third-party identity management provider and leverage single sign-on. You learn that a significant number of users are using their corporate domain email addresses for personal Google accounts, and you need to follow Google recommended practices to convert existing unmanaged users to managed accounts.

    Which two actions should you take? (Choose two.)

    A. Use Google Cloud Directory Sync to synchronize your local identity management system to Cloud Identity.

    B. Use the Google Admin console to view which managed users are using a personal account for their recovery email.

    C. Add users to your managed Google account and force users to change the email addresses associated with their personal accounts.

    D. Use the Transfer Tool for Unmanaged Users (TTUU) to find users with conflicting accounts and ask them to transfer their personal Google accounts.

    E. Send an email to all of your employees and ask those users with corporate email addresses for personal Google accounts to delete the personal accounts immediately.

  • Question 140:

    You are on your company's development team. You noticed that your web application hosted in staging on GKE dynamically includes user data in web pages without first properly validating the inputted data. This could allow an attacker to execute gibberish commands and display arbitrary content in a victim user's browser in a production environment.

    How should you prevent and fix this vulnerability?

    A. Use Cloud IAP based on IP address or end-user device attributes to prevent and fix the vulnerability.

    B. Set up an HTTPS load balancer, and then use Cloud Armor for the production environment to prevent the potential XSS attack.

    C. Use Web Security Scanner to validate the usage of an outdated library in the code, and then use a secured version of the included library.

    D. Use Web Security Scanner in staging to simulate an XSS injection attack, and then use a templating system that supports contextual auto-escaping.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PROFESSIONAL-CLOUD-SECURITY-ENGINEER exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.