Exam Details

  • Exam Code
    :PROFESSIONAL-CLOUD-SECURITY-ENGINEER
  • Exam Name
    :Professional Cloud Security Engineer
  • Certification
    :Google Certifications
  • Vendor
    :Google
  • Total Questions
    :244 Q&As
  • Last Updated
    :May 19, 2025

Google Google Certifications PROFESSIONAL-CLOUD-SECURITY-ENGINEER Questions & Answers

  • Question 191:

    You work for an organization in a regulated industry that has strict data protection requirements. The organization backs up their data in the cloud. To comply with data privacy regulations, this data can only be stored for a specific length of

    time and must be deleted after this specific period.

    You want to automate the compliance with this regulation while minimizing storage costs.

    What should you do?

    A. Store the data in a persistent disk, and delete the disk at expiration time.

    B. Store the data in a Cloud Bigtable table, and set an expiration time on the column families.

    C. Store the data in a BigQuery table, and set the table's expiration time.

    D. Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.

  • Question 192:

    Your organization is moving virtual machines (VMs) to Google Cloud. You must ensure that operating system images that are used across your projects are trusted and meet your security requirements. What should you do?

    A. Implement an organization policy to enforce that boot disks can only be created from images that come from the trusted image project.

    B. Create a Cloud Function that is automatically triggered when a new virtual machine is created from the trusted image repository Verify that the image is not deprecated.

    C. Implement an organization policy constraint that enables the Shielded VM service on all projects to enforce the trusted image repository usage.

    D. Automate a security scanner that verifies that no common vulnerabilities and exposures (CVEs) are present in your trusted image repository.

  • Question 193:

    A company has redundant mail servers in different Google Cloud Platform regions and wants to route customers to the nearest mail server based on location. How should the company accomplish this?

    A. Configure TCP Proxy Load Balancing as a global load balancing service listening on port 995.

    B. Create a Network Load Balancer to listen on TCP port 995 with a forwarding rule to forward traffic based on location.

    C. Use Cross-Region Load Balancing with an HTTP(S) load balancer to route traffic to the nearest region.

    D. Use Cloud CDN to route the mail traffic to the closest origin mail server based on client IP address.

  • Question 194:

    Your organization processes sensitive health information. You want to ensure that data is encrypted while in use by the virtual machines (VMs). You must create a policy that is enforced across the entire organization. What should you do?

    A. Implement an organization policy that ensures that all VM resources created across your organization use customer-managed encryption keys (CMEK) protection.

    B. Implement an organization policy that ensures all VM resources created across your organization are Confidential VM instances.

    C. Implement an organization policy that ensures that all VM resources created across your organization use Cloud External Key Manager (EKM) protection.

    D. No action is necessary because Google encrypts data while it is in use by default.

  • Question 195:

    An organization is migrating from their current on-premises productivity software systems to G Suite. Some network security controls were in place that were mandated by a regulatory body in their region for their previous on-premises system. The organization's risk team wants to ensure that network security controls are maintained and effective in G Suite. A security architect supporting this migration has been asked to ensure that network security controls are in place as part of the new shared responsibility model between the organization and Google Cloud.

    What solution would help meet the requirements?

    A. Ensure that firewall rules are in place to meet the required controls.

    B. Set up Cloud Armor to ensure that network security controls can be managed for G Suite.

    C. Network security is a built-in solution and Google's Cloud responsibility for SaaS products like G Suite.

    D. Set up an array of Virtual Private Cloud (VPC) networks to control network security as mandated by the relevant regulation.

  • Question 196:

    Your organization is using GitHub Actions as a continuous integration and delivery (Cl/CD) platform. You must enable access to Google Cloud resources from the Cl/CD pipelines in the most secure way. What should you do?

    A. Create a service account key and add it to the GitHub pipeline configuration file.

    B. Create a service account key and add it to the GitHub repository content.

    C. Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.

    D. Configure workload identity federation to use GitHub as an identity pool provider.

  • Question 197:

    Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process. What should you do?

    A. Use the Cloud Key Management Service to manage a data encryption key (DEK).

    B. Use the Cloud Key Management Service to manage a key encryption key (KEK).

    C. Use customer-supplied encryption keys to manage the data encryption key (DEK).

    D. Use customer-supplied encryption keys to manage the key encryption key (KEK).

  • Question 198:

    Your organization's Google Cloud VMs are deployed via an instance template that configures them with a public IP address in order to host web services for external users. The VMs reside in a service project that is attached to a host (VPC) project containing one custom Shared VPC for the VMs. You have been asked to reduce the exposure of the VMs to the internet while continuing to service external users. You have already recreated the instance template without a public IP address configuration to launch the managed instance group (MIG). What should you do?

    A. Deploy a Cloud NAT Gateway in the service project for the MIG.

    B. Deploy a Cloud NAT Gateway in the host (VPC) project for the MIG.

    C. Deploy an external HTTP(S) load balancer in the service project with the MIG as a backend.

    D. Deploy an external HTTP(S) load balancer in the host (VPC) project with the MIG as a backend.

  • Question 199:

    Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).

    Which steps should your team take before an incident occurs? (Choose two.)

    A. Disable and revoke access to compromised keys.

    B. Enable automatic key version rotation on a regular schedule.

    C. Manually rotate key versions on an ad hoc schedule.

    D. Limit the number of messages encrypted with each key version.

    E. Disable the Cloud KMS API.

  • Question 200:

    You want to make sure that your organization's Cloud Storage buckets cannot have data publicly available to the internet. You want to enforce this across all Cloud Storage buckets. What should you do?

    A. Remove Owner roles from end users, and configure Cloud Data Loss Prevention.

    B. Remove Owner roles from end users, and enforce domain restricted sharing in an organization policy.

    C. Configure uniform bucket-level access, and enforce domain restricted sharing in an organization policy.

    D. Remove *.setIamPolicy permissions from all roles, and enforce domain restricted sharing in an organization policy.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PROFESSIONAL-CLOUD-SECURITY-ENGINEER exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.