問題一覧
1
Use the Organization Policy Service to create a compute.trustedimageProjects constraint on the organization level. List the trusted project as the whitelist in an allow operation.
2
Remove all users from the Project Creator role at the organizational level., Add a designated group of users to the Project Creator role at the organizational level.
3
Build new base images when patches are available, and use a CI/CD pipeline to rebuild VMs, deploying incrementally.
4
Create an ingress firewall rule to allow access only from the application to the database using firewall tags.
5
Multifactor Authentication
6
VPC Peering
7
Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.
8
Non-transitive peered networks; where only directly peered networks can communicate, Ability to peer networks that belong to different Google Cloud organizations
9
Update the application code or apply a patch, build a new image, and redeploy it.
10
Use the Cloud Data Loss Prevention API to redact related infoTypes before data is ingested into BigQuery.
11
Run each tier with a different Service Account (SA), and use SA-based firewall rules.
12
Cloud Storage buckets
13
Place a taint on the Nodes with the label inscope: true and effect NoSchedule and a toleration to match in the Pod configuration.
14
Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module.
15
Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority less than 1000.
16
Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the KeyRing level.
17
Use Cloud Pub/Sub and Cloud Functions to trigger a Data Loss Prevention scan every time a file is uploaded to the shared bucket. If the scan detects PII, have the function move into a Cloud Storage bucket only accessible by the administrator.
18
Configure Cloud Directory Sync with their directory service to provision and deprovision users from Cloud Identity.
19
Google Cloud Directory Sync (GCDS)
20
ISO 27017
21
Create a custom role with the permission compute.instances.list and grant the Service Account this role.
22
Network Security , Access Policies
23
Cloud Storage using a scheduled task and gsutil via Cloud Interconnect
24
✑ Generate a data encryption key (DEK) locally. ✑ Encrypt data with the DEK. ✑ Use a key encryption key (KEK) to wrap the DEK. ✑ Store the encrypted data and the wrapped DEK.
25
Cloud Identity-Aware Proxy
26
Use customer-supplied encryption keys to manage the key encryption key (KEK).
27
1. Use Cloud Logging and filter on BigQuery Insert Jobs. 2. Click on the email address in line with the App Engine Default Service Account in the authentication field. 3. Click Hide Matching Entries. 4. Make sure the resulting list is empty.
28
Organization Administrator, Super Admin
29
Defending against XSS and SQLi attacks
30
Cloud Armor
31
Configure Private Google Access on the Compute Engine subnet, Avoid assigning public IP addresses to the Compute Engine cluster.
32
Enable Private Google Access.
33
Use rowsLimit and bytesLimitPerFile to sample data and use CloudStorageRegexFileSet to limit scans.
34
Use the undelete command to recover the deleted service account.
35
Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have ג€user email addressג€ as the attribute to facilitate one-way sync.
36
Query Admin Activity logs.
37
Configure an ingress firewall rule that allows communication from the frontend's unique service account to the unique service account of the mysql Compute Engine VM on port 3306.
38
Change the load balancer frontend configuration to use the Premium Tier network, and add the new instance group.
39
Set up Uniform bucket-level access on the Cloud Storage bucket and manage access for users using IAM.
40
Use an infrastructure-as-code software tool to set up a single service perimeter and to deploy a Cloud Function that monitors the "implementation" folder via Stackdriver and Cloud Pub/Sub. When the function notices that a new project is added to the folder, it executes Terraform to add the new project to the associated perimeter.
41
Use Google Cloud Directory Sync to synchronize your local identity management system to Cloud Identity, Use the Transfer Tool for Unmanaged Users (TTUU) to find users with conflicting accounts and ask them to transfer their personal Google accounts.
42
Use Web Security Scanner in staging to simulate an XSS injection attack, and then use a templating system that supports contextual auto-escaping.
43
Enable VPC Service Controls, create a perimeter with Project A and B, and include Cloud Storage service.
44
Perform tokenization for Pseudonymization with the Cloud Data Loss Prevention API, and store that data in BigQuery for later use.
45
Use organization policy constraints/iam.disableServiceAccountCreation boolean to disable the creation of new service accounts.
46
Policy Analyzer
47
Create an Active Directory domain password policy with strong password settings, and configure post-SSO (single sign-on) 2-Step Verification with security keys in the Google Admin console.
48
Google Cloud Armor's preconfigured rules in preview mode
49
Secret Manager
50
Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud Key Management Service.
examen Alexandru
examen Alexandru
ユーザ名非公開 · 40問 · 8日前examen Alexandru
examen Alexandru
40問 • 8日前M#5 Section and Title v2
M#5 Section and Title v2
ユーザ名非公開 · 32問 · 13日前M#5 Section and Title v2
M#5 Section and Title v2
32問 • 13日前MPLE
MPLE
ユーザ名非公開 · 41問 · 13日前MPLE
MPLE
41問 • 13日前Weekly Test 3
Weekly Test 3
ユーザ名非公開 · 50問 · 13日前Weekly Test 3
Weekly Test 3
50問 • 13日前Weekly Test 2
Weekly Test 2
ユーザ名非公開 · 50問 · 13日前Weekly Test 2
Weekly Test 2
50問 • 13日前Refresher SPDI 1
Refresher SPDI 1
ユーザ名非公開 · 9問 · 13日前Refresher SPDI 1
Refresher SPDI 1
9問 • 13日前Refresher SPDI 1
Refresher SPDI 1
ユーザ名非公開 · 100問 · 13日前Refresher SPDI 1
Refresher SPDI 1
100問 • 13日前Definition of Terms 3
Definition of Terms 3
ユーザ名非公開 · 90問 · 13日前Definition of Terms 3
Definition of Terms 3
90問 • 13日前Definition of Terms 2
Definition of Terms 2
ユーザ名非公開 · 90問 · 13日前Definition of Terms 2
Definition of Terms 2
90問 • 13日前Definition of Terms 1
Definition of Terms 1
ユーザ名非公開 · 90問 · 13日前Definition of Terms 1
Definition of Terms 1
90問 • 13日前WT 6
WT 6
ユーザ名非公開 · 50問 · 13日前WT 6
WT 6
50問 • 13日前WT 3
WT 3
ユーザ名非公開 · 50問 · 13日前WT 3
WT 3
50問 • 13日前SPI version D pt 2
SPI version D pt 2
ユーザ名非公開 · 61問 · 13日前SPI version D pt 2
SPI version D pt 2
61問 • 13日前RNPCP Chapter 6 to 9
RNPCP Chapter 6 to 9
ユーザ名非公開 · 94問 · 13日前RNPCP Chapter 6 to 9
RNPCP Chapter 6 to 9
94問 • 13日前Item 303 Bituminous Seal Coat
Item 303 Bituminous Seal Coat
ユーザ名非公開 · 20問 · 13日前Item 303 Bituminous Seal Coat
Item 303 Bituminous Seal Coat
20問 • 13日前Item 301 Bituminous Prime Coat
Item 301 Bituminous Prime Coat
ユーザ名非公開 · 10問 · 13日前Item 301 Bituminous Prime Coat
Item 301 Bituminous Prime Coat
10問 • 13日前Item 300 Aggregate Surface Course
Item 300 Aggregate Surface Course
ユーザ名非公開 · 11問 · 13日前Item 300 Aggregate Surface Course
Item 300 Aggregate Surface Course
11問 • 13日前Item 206 Chemically Stabilized Road Mix Subbase/Base Course
Item 206 Chemically Stabilized Road Mix Subbase/Base Course
ユーザ名非公開 · 11問 · 13日前Item 206 Chemically Stabilized Road Mix Subbase/Base Course
Item 206 Chemically Stabilized Road Mix Subbase/Base Course
11問 • 13日前Item 207 Portland Cement Stabilized Treated Plant Mix Base Course
Item 207 Portland Cement Stabilized Treated Plant Mix Base Course
ユーザ名非公開 · 13問 · 13日前Item 207 Portland Cement Stabilized Treated Plant Mix Base Course
Item 207 Portland Cement Stabilized Treated Plant Mix Base Course
13問 • 13日前Item 204 Portland Cement Stabilized Road Mix Base Course
Item 204 Portland Cement Stabilized Road Mix Base Course
ユーザ名非公開 · 7問 · 13日前Item 204 Portland Cement Stabilized Road Mix Base Course
Item 204 Portland Cement Stabilized Road Mix Base Course
7問 • 13日前問題一覧
1
Use the Organization Policy Service to create a compute.trustedimageProjects constraint on the organization level. List the trusted project as the whitelist in an allow operation.
2
Remove all users from the Project Creator role at the organizational level., Add a designated group of users to the Project Creator role at the organizational level.
3
Build new base images when patches are available, and use a CI/CD pipeline to rebuild VMs, deploying incrementally.
4
Create an ingress firewall rule to allow access only from the application to the database using firewall tags.
5
Multifactor Authentication
6
VPC Peering
7
Set up an organization policy to only permit public IPs for the front-end Compute Engine instances.
8
Non-transitive peered networks; where only directly peered networks can communicate, Ability to peer networks that belong to different Google Cloud organizations
9
Update the application code or apply a patch, build a new image, and redeploy it.
10
Use the Cloud Data Loss Prevention API to redact related infoTypes before data is ingested into BigQuery.
11
Run each tier with a different Service Account (SA), and use SA-based firewall rules.
12
Cloud Storage buckets
13
Place a taint on the Nodes with the label inscope: true and effect NoSchedule and a toleration to match in the Pod configuration.
14
Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module.
15
Create an egress firewall rule to allow traffic to the CIDR range of the repository with a priority less than 1000.
16
Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the KeyRing level.
17
Use Cloud Pub/Sub and Cloud Functions to trigger a Data Loss Prevention scan every time a file is uploaded to the shared bucket. If the scan detects PII, have the function move into a Cloud Storage bucket only accessible by the administrator.
18
Configure Cloud Directory Sync with their directory service to provision and deprovision users from Cloud Identity.
19
Google Cloud Directory Sync (GCDS)
20
ISO 27017
21
Create a custom role with the permission compute.instances.list and grant the Service Account this role.
22
Network Security , Access Policies
23
Cloud Storage using a scheduled task and gsutil via Cloud Interconnect
24
✑ Generate a data encryption key (DEK) locally. ✑ Encrypt data with the DEK. ✑ Use a key encryption key (KEK) to wrap the DEK. ✑ Store the encrypted data and the wrapped DEK.
25
Cloud Identity-Aware Proxy
26
Use customer-supplied encryption keys to manage the key encryption key (KEK).
27
1. Use Cloud Logging and filter on BigQuery Insert Jobs. 2. Click on the email address in line with the App Engine Default Service Account in the authentication field. 3. Click Hide Matching Entries. 4. Make sure the resulting list is empty.
28
Organization Administrator, Super Admin
29
Defending against XSS and SQLi attacks
30
Cloud Armor
31
Configure Private Google Access on the Compute Engine subnet, Avoid assigning public IP addresses to the Compute Engine cluster.
32
Enable Private Google Access.
33
Use rowsLimit and bytesLimitPerFile to sample data and use CloudStorageRegexFileSet to limit scans.
34
Use the undelete command to recover the deleted service account.
35
Configure Google Cloud Directory Sync to sync security groups using LDAP search rules that have ג€user email addressג€ as the attribute to facilitate one-way sync.
36
Query Admin Activity logs.
37
Configure an ingress firewall rule that allows communication from the frontend's unique service account to the unique service account of the mysql Compute Engine VM on port 3306.
38
Change the load balancer frontend configuration to use the Premium Tier network, and add the new instance group.
39
Set up Uniform bucket-level access on the Cloud Storage bucket and manage access for users using IAM.
40
Use an infrastructure-as-code software tool to set up a single service perimeter and to deploy a Cloud Function that monitors the "implementation" folder via Stackdriver and Cloud Pub/Sub. When the function notices that a new project is added to the folder, it executes Terraform to add the new project to the associated perimeter.
41
Use Google Cloud Directory Sync to synchronize your local identity management system to Cloud Identity, Use the Transfer Tool for Unmanaged Users (TTUU) to find users with conflicting accounts and ask them to transfer their personal Google accounts.
42
Use Web Security Scanner in staging to simulate an XSS injection attack, and then use a templating system that supports contextual auto-escaping.
43
Enable VPC Service Controls, create a perimeter with Project A and B, and include Cloud Storage service.
44
Perform tokenization for Pseudonymization with the Cloud Data Loss Prevention API, and store that data in BigQuery for later use.
45
Use organization policy constraints/iam.disableServiceAccountCreation boolean to disable the creation of new service accounts.
46
Policy Analyzer
47
Create an Active Directory domain password policy with strong password settings, and configure post-SSO (single sign-on) 2-Step Verification with security keys in the Google Admin console.
48
Google Cloud Armor's preconfigured rules in preview mode
49
Secret Manager
50
Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud Key Management Service.