問題一覧
1
Private Google Access, Public IP
2
A rule that allows all outbound connections, A rule that denies all inbound connections
3
Encrypt the secrets with a Customer-Managed Encryption Key (CMEK), and store them in Cloud Storage.
4
Set up Cloud Directory Sync to sync groups, and set IAM permissions on the groups.
5
Package a single app as a container., Remove any unnecessary tools not needed by the app.
6
Cloud Armor
7
Configure the project with Cloud VPN., Configure the project with Cloud Interconnect.
8
Make sure that the ERP system can validate the JWT assertion in the HTTP requests.
9
Create an Alerting Policy in Stackdriver using a Process Health condition, checking that the number of executions of the script remains below the desired threshold. Enable notifications.
10
1. Export logs in each dev project to a Cloud Pub/Sub topic in a dedicated SIEM project. 2. Subscribe SIEM to the topic
11
DNS Security Extensions
12
Web Security Scanner
13
Ask customer's management to discover any other uses of Google managed services, and work with the existing Super Administrator.
14
Organization Administrator
15
Use a service account with read-only access to the Cloud Storage bucket to retrieve the credentials from the instance metadata.
16
Mandate use of infrastructure as code and provide static analysis in the CI/CD pipelines to enforce policies.
17
CryptoReplaceFfxFpeConfig
18
Set the minimum length for passwords to be 8 characters.
19
Generate a data encryption key (DEK) locally to encrypt the data, and generate a new key encryption key (KEK) in Cloud KMS to encrypt the DEK. Store both the encrypted data and the encrypted DEK.
20
Configure Organizational Log Sinks to export logs to a Cloud Pub/Sub Topic, which will be sent to the SIEM via Dataflow.
21
Compute Engine, Google Kubernetes Engine
22
Enable Cloud Identity-Aware Proxy (IAP), and allow access to a Google Group that contains the customer and employee user accounts.
23
Use the image inspection and redaction actions of the DLP API to redact PII from the images before storing them for analysis.
24
Create a new key, and use the new key in the application. Delete the old key from the Service Account.
25
Shared VPC Network with a host project and service projects
26
Network security is a built-in solution and Google's Cloud responsibility for SaaS products like G Suite.
27
Create an organization node, and assign folders for each business unit.
28
Create a Network Load Balancer to listen on TCP port 995 with a forwarding rule to forward traffic based on location.
29
Compute Network User Role at the subnet level.
30
Use Security Command Center to view all assets across the organization.
31
Cloud Storage using a scheduled task and gsutil
32
Create a new service account, and grant it G Suite domain-wide delegation. Have the application use it to impersonate the user.
33
Customer-managed encryption keys (CMEK) using Cloud Key Management Service (KMS)
34
Use the Cloud Key Management Service to manage the key encryption key (KEK).
35
Move the cardholder data environment into a separate GCP project.
36
Cloud Data Loss Prevention API
37
Create a Folder per department under the Organization. For each department's Folder, assign the Project Viewer role to the Google Group related to that department.
38
Use the gsutil command line tool to upload the object to Cloud Storage, and specify the location of the encryption key.
39
Create a folder for each development and production environment., Create a Google Group for the Engineering team, and assign permissions at the folder level.
40
Google Cloud Platform: Customer Responsibility Matrix
41
Store the data in a single Cloud Storage bucket and configure the bucket's Time to Live.
42
Build small containers using small base images.
43
Use Google Cloud Directory Sync to synchronize the data in Google domain with your existing Active Directory or LDAP server.
44
Enforce 2-factor authentication in GSuite for all users.
45
Customer-managed encryption keys (CMEK).
46
Cloud BigQuery
47
Configure an SSL Certificate on an L7 Load Balancer and require encryption.
48
Admin Activity Logs, Data Access Logs
49
Migrate the application into an isolated project using a ג€Lift & Shiftג€ approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
50
SSL Proxy Load Balancing
PCSE 51-100
PCSE 51-100
Mark Joseph Tinawin · 50問 · 1年前PCSE 51-100
PCSE 51-100
50問 • 1年前PCSE 101-150
PCSE 101-150
Mark Joseph Tinawin · 50問 · 1年前PCSE 101-150
PCSE 101-150
50問 • 1年前PCSE 151-200
PCSE 151-200
Mark Joseph Tinawin · 50問 · 1年前PCSE 151-200
PCSE 151-200
50問 • 1年前PCSE 201-244
PCSE 201-244
Mark Joseph Tinawin · 44問 · 1年前PCSE 201-244
PCSE 201-244
44問 • 1年前問題一覧
1
Private Google Access, Public IP
2
A rule that allows all outbound connections, A rule that denies all inbound connections
3
Encrypt the secrets with a Customer-Managed Encryption Key (CMEK), and store them in Cloud Storage.
4
Set up Cloud Directory Sync to sync groups, and set IAM permissions on the groups.
5
Package a single app as a container., Remove any unnecessary tools not needed by the app.
6
Cloud Armor
7
Configure the project with Cloud VPN., Configure the project with Cloud Interconnect.
8
Make sure that the ERP system can validate the JWT assertion in the HTTP requests.
9
Create an Alerting Policy in Stackdriver using a Process Health condition, checking that the number of executions of the script remains below the desired threshold. Enable notifications.
10
1. Export logs in each dev project to a Cloud Pub/Sub topic in a dedicated SIEM project. 2. Subscribe SIEM to the topic
11
DNS Security Extensions
12
Web Security Scanner
13
Ask customer's management to discover any other uses of Google managed services, and work with the existing Super Administrator.
14
Organization Administrator
15
Use a service account with read-only access to the Cloud Storage bucket to retrieve the credentials from the instance metadata.
16
Mandate use of infrastructure as code and provide static analysis in the CI/CD pipelines to enforce policies.
17
CryptoReplaceFfxFpeConfig
18
Set the minimum length for passwords to be 8 characters.
19
Generate a data encryption key (DEK) locally to encrypt the data, and generate a new key encryption key (KEK) in Cloud KMS to encrypt the DEK. Store both the encrypted data and the encrypted DEK.
20
Configure Organizational Log Sinks to export logs to a Cloud Pub/Sub Topic, which will be sent to the SIEM via Dataflow.
21
Compute Engine, Google Kubernetes Engine
22
Enable Cloud Identity-Aware Proxy (IAP), and allow access to a Google Group that contains the customer and employee user accounts.
23
Use the image inspection and redaction actions of the DLP API to redact PII from the images before storing them for analysis.
24
Create a new key, and use the new key in the application. Delete the old key from the Service Account.
25
Shared VPC Network with a host project and service projects
26
Network security is a built-in solution and Google's Cloud responsibility for SaaS products like G Suite.
27
Create an organization node, and assign folders for each business unit.
28
Create a Network Load Balancer to listen on TCP port 995 with a forwarding rule to forward traffic based on location.
29
Compute Network User Role at the subnet level.
30
Use Security Command Center to view all assets across the organization.
31
Cloud Storage using a scheduled task and gsutil
32
Create a new service account, and grant it G Suite domain-wide delegation. Have the application use it to impersonate the user.
33
Customer-managed encryption keys (CMEK) using Cloud Key Management Service (KMS)
34
Use the Cloud Key Management Service to manage the key encryption key (KEK).
35
Move the cardholder data environment into a separate GCP project.
36
Cloud Data Loss Prevention API
37
Create a Folder per department under the Organization. For each department's Folder, assign the Project Viewer role to the Google Group related to that department.
38
Use the gsutil command line tool to upload the object to Cloud Storage, and specify the location of the encryption key.
39
Create a folder for each development and production environment., Create a Google Group for the Engineering team, and assign permissions at the folder level.
40
Google Cloud Platform: Customer Responsibility Matrix
41
Store the data in a single Cloud Storage bucket and configure the bucket's Time to Live.
42
Build small containers using small base images.
43
Use Google Cloud Directory Sync to synchronize the data in Google domain with your existing Active Directory or LDAP server.
44
Enforce 2-factor authentication in GSuite for all users.
45
Customer-managed encryption keys (CMEK).
46
Cloud BigQuery
47
Configure an SSL Certificate on an L7 Load Balancer and require encryption.
48
Admin Activity Logs, Data Access Logs
49
Migrate the application into an isolated project using a ג€Lift & Shiftג€ approach. Enable all internal TCP traffic using VPC Firewall rules. Use VPC Flow logs to determine what traffic should be allowed for the application to work properly.
50
SSL Proxy Load Balancing