Exam Details

  • Exam Code
    :PROFESSIONAL-CLOUD-SECURITY-ENGINEER
  • Exam Name
    :Professional Cloud Security Engineer
  • Certification
    :Google Certifications
  • Vendor
    :Google
  • Total Questions
    :244 Q&As
  • Last Updated
    :May 19, 2025

Google Google Certifications PROFESSIONAL-CLOUD-SECURITY-ENGINEER Questions & Answers

  • Question 171:

    You have noticed an increased number of phishing attacks across your enterprise user accounts. You want to implement the Google 2-Step Verification (2SV) option that uses a cryptographic signature to authenticate a user and verify the URL of the login page.

    Which Google 2SV option should you use?

    A. Titan Security Keys

    B. Google prompt

    C. Google Authenticator app

    D. Cloud HSM keys

  • Question 172:

    A website design company recently migrated all customer sites to App Engine. Some sites are still in progress and should only be visible to customers and company employees from any location. Which solution will restrict access to the in-progress sites?

    A. Upload an .htaccess file containing the customer and employee user accounts to App Engine.

    B. Create an App Engine firewall rule that allows access from the customer and employee networks and denies all other traffic.

    C. Enable Cloud Identity-Aware Proxy (IAP), and allow access to a Google Group that contains the customer and employee user accounts.

    D. Use Cloud VPN to create a VPN connection between the relevant on-premises networks and the company's GCP Virtual Private Cloud (VPC) network.

  • Question 173:

    You are auditing all your Google Cloud resources in the production project. You want to identity all principals who can change firewall rules. What should you do?

    A. Use Policy Analyzer lo query the permissions compute, firewalls, create of compute, firewalls. Create of compute,firewalls.delete.

    B. Reference the Security Health Analytics -Firewall Vulnerability Findings in the Security Command Center.

    C. Use Policy Analyzer to query the permissions compute, firewalls, get of compute, firewalls, list.

    D. Use Firewall Insights to understand your firewall rules usage patterns.

  • Question 174:

    You are using Security Command Center (SCC) to protect your workloads and receive alerts for suspected security breaches at your company. You need to detect cryptocurrency mining software. Which SCC service should you use?

    A. Container Threat Detection

    B. Web Security Scanner

    C. Rapid Vulnerability Detection

    D. Virtual Machine Threat Detection

  • Question 175:

    Your organization wants to be continuously evaluated against CIS Google Cloud Computing Foundations Benchmark v1 3 0 (CIS Google Cloud Foundation 1 3). Some of the controls are irrelevant to your organization and must be disregarded in evaluation. You need to create an automated system or process to ensure that only the relevant controls are evaluated.

    What should you do?

    A. Mark all security findings that are irrelevant with a tag and a value that indicates a security exception Select all marked findings and mute them on the console every time they appear Activate Security Command Center (SCC) Premium.

    B. Activate Security Command Center (SCC) Premium Create a rule to mute the security findings in SCC so they are not evaluated.

    C. Download all findings from Security Command Center (SCC) to a CSV file Mark the findings that are part of CIS Google Cloud Foundation 1 3 in the file Ignore the entries that are irrelevant and out of scope for the company.

    D. Ask an external audit company to provide independent reports including needed CIS benchmarks. In the scope of the audit clarify that some of the controls are not needed and must be disregarded.

  • Question 176:

    Your team wants to make sure Compute Engine instances running in your production project do not have public IP addresses. The frontend application Compute Engine instances will require public IPs. The product engineers have the Editor role to modify resources. Your team wants to enforce this requirement.

    How should your team meet these requirements?

    A. Enable Private Access on the VPC network in the production project.

    B. Remove the Editor role and grant the Compute Admin IAM role to the engineers.

    C. Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.

    D. Set up a VPC network with two subnets: one with public IPs and one without public IPs.

  • Question 177:

    A large e-retailer is moving to Google Cloud Platform with its ecommerce website. The company wants to ensure payment information is encrypted between the customer's browser and GCP when the customers checkout online. What should they do?

    A. Configure an SSL Certificate on an L7 Load Balancer and require encryption.

    B. Configure an SSL Certificate on a Network TCP Load Balancer and require encryption.

    C. Configure the firewall to allow inbound traffic on port 443, and block all other inbound traffic.

    D. Configure the firewall to allow outbound traffic on port 443, and block all other outbound traffic.

  • Question 178:

    You want data on Compute Engine disks to be encrypted at rest with keys managed by Cloud Key Management Service (KMS). Cloud Identity and Access Management (IAM) permissions to these keys must be managed in a grouped way because the permissions should be the same for all keys.

    What should you do?

    A. Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the Key level.

    B. Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the KeyRing level.

    C. Create a KeyRing per persistent disk, with each KeyRing containing a single Key. Manage the IAM permissions at the Key level.

    D. Create a KeyRing per persistent disk, with each KeyRing containing a single Key. Manage the IAM permissions at the KeyRing level.

  • Question 179:

    You are responsible for protecting highly sensitive data in BigQuery. Your operations teams need access to this data, but given privacy regulations, you want to ensure that they cannot read the sensitive fields such as email addresses and first names. These specific sensitive fields should only be available on a need-to-know basis to the HR team. What should you do?

    A. Perform data masking with the DLP API and store that data in BigQuery for later use.

    B. Perform data redaction with the DLP API and store that data in BigQuery for later use.

    C. Perform data inspection with the DLP API and store that data in BigQuery for later use.

    D. Perform tokenization for Pseudonymization with the DLP API and store that data in BigQuery for later use.

  • Question 180:

    Your team needs to obtain a unified log view of all development cloud projects in your SIEM. The development projects are under the NONPROD organization folder with the test and pre-production projects. The development projects share the ABC-BILLING billing account with the rest of the organization.

    Which logging export strategy should you use to meet the requirements?

    A. 1. Export logs to a Cloud Pub/Sub topic with folders/NONPROD parent and includeChildren property set to True in a dedicated SIEM project. 2.Subscribe SIEM to the topic.

    B. 1. Create a Cloud Storage sink with billingAccounts/ABC-BILLING parent and includeChildren property set to False in a dedicated SIEM project. 2.Process Cloud Storage objects in SIEM.

    C. 1. Export logs in each dev project to a Cloud Pub/Sub topic in a dedicated SIEM project. 2.Subscribe SIEM to the topic.

    D. 1. Create a Cloud Storage sink with a publicly shared Cloud Storage bucket in each project. 2.Process Cloud Storage objects in SIEM.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PROFESSIONAL-CLOUD-SECURITY-ENGINEER exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.