Your multinational organization is undergoing rapid expansion within Google Cloud. New teams and projects are added frequently. You are concerned about the potential for inconsistent security policy application and permission sprawl across the organization. You must enforce consistent standards while maintaining the autonomy of regional teams. You need to design a strategy to effectively manage IAM and organization policies at scale, ensuring security and administrative efficiency. What should you do?
A. Define a small set of essential organization policies. Supplement these policies with a library of optional policy templates for teams to leverage as needed.
B. Use a hierarchical structure of folders. Implement template-based organization policies that cascade down, allowing limited customization by regional teams.
C. Create detailed organization-wide policies for common scenarios. Instruct teams to apply the policies carefully at the project and resource level as needed.
D. Delegate the creation of organization policies to regional teams. Centrally review these policies for compliance before deployment.
正解:B
質問 2:
A customer's data science group wants to use Google Cloud Platform (GCP) for their analytics workloads. Company policy dictates that all data must be company-owned and all user authentications must go through their own Security Assertion Markup Language (SAML) 2.0 Identity Provider (IdP). The Infrastructure Operations Systems Engineer was trying to set up Cloud Identity for the customer and realized that their domain was already being used by G Suite.
How should you best advise the Systems Engineer to proceed with the least disruption?
A. Register a new domain name, and use that for the new Cloud Identity domain.
B. Contact Google Support and initiate the Domain Contestation Process to use the domain name in your new Cloud Identity domain.
C. Ask Google to provision the data science manager's account as a Super Administrator in the existing domain.
D. Ask customer's management to discover any other uses of Google managed services, and work with the existing Super Administrator.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Your organization uses the top-tier folder to separate application environments (prod and dev).
The developers need to see all application development audit logs, but they are not permitted to review production logs. Your security team can review all logs in production and development environments. You must grant Identity and Access Management (IAM) roles at the right resource level for the developers and security team while you ensure least privilege.
What should you do?
A. 1. Grant logging.viewer role to the security team at the organization resource level.
2. Grant logging.viewer role to the developer team at the folder resource level that contains all the dev projects.
B. 1. Grant logging.admin role to the security team at the organization resource level.
2. Grant logging.viewer role to the developer team at the folder resource level that contains all the dev projects.
C. 1. Grant logging.viewer role to the security team at the organization resource level.
2. Grant logging.admin role to the developer team at the organization resource level.
D. 1. Grant logging.admin role to the security team at the organization resource level.
2. Grant logging.admin role to the developer team at the organization resource level.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
An engineering team is launching a web application that will be public on the internet. The web application is hosted in multiple GCP regions and will be directed to the respective backend based on the URL request.
Your team wants to avoid exposing the application directly on the internet and wants to deny traffic from a specific list of malicious IP addresses Which solution should your team implement to meet these requirements?
A. Cloud Armor
B. NAT Gateway
C. SSL Proxy Load Balancing
D. Network Load Balancing
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
You are a member of the security team at an organization. Your team has a single GCP project with credit card payment processing systems alongside web applications and data processing systems. You want to reduce the scope of systems subject to PCI audit standards.
What should you do?
A. Use only applications certified compliant with PA-DSS.
B. Use VPN for all connections between your office and cloud environments.
C. Use multi-factor authentication for admin access to the web application.
D. Move the cardholder data environment into a separate GCP project.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Your organization recently deployed a new application on Google Kubernetes Engine. You need to deploy a solution to protect the application. The solution has the following requirements:
- Scans must run at least once per week
- Must be able to detect cross-site scripting vulnerabilities
- Must be able to authenticate using Google accounts
Which solution should you use?
A. Web Security Scanner
B. Security Health Analytics
C. Google Cloud Armor
D. Container Threat Detection
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
You are asked to recommend a solution to store and retrieve sensitive configuration data from an application that runs on Compute Engine. Which option should you recommend?
A. Cloud Key Management Service
B. Compute Engine custom metadata
C. Compute Engine guest attributes
D. Secret Manager
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
Sato -
本格的なProfessional-Cloud-Security-Engineer問題も掲載されてるし、索引も充実!