問題一覧
1
Deterministic encryption
2
Billing Account Viewer, Billing Account Costs Manager
3
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
4
Enable Access Transparency logs with Access Approval requests for Google employees.
5
SSO SAML as a third-party IdP, Cloud Identity
6
Organize projects in folders, and assign permissions to Google groups at the folder level., Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.
7
Web Security Scanner
8
Dedicated Interconnect
9
Cloud DNS with DNSSEC
10
Use the Logs Explorer to search for user activity.
11
Configure packet mirroring policies.
12
1. Configure the option to suspend domain users not found in LDAP. 2. Set up a recurring GCDS task.
13
Add the host project containing the Shared VPC to the service perimeter.
14
Firewall Insights
15
roles/logging.privateLogViewer
16
Change the access control model for the bucket
17
Create a custom service account for the cluster. Enable the constraints/iam.disableServiceAccountKeyCreation organization policy at the project level
18
1. Set up two VPC networks: one trusted and the other untrusted. 2. Configure a virtual appliance using multiple network interfaces, with each interface connected to one of the VPC networks.
19
Implement Identity-Aware Proxy TCP forwarding for the bastion host.
20
Dry Run
21
Packet Mirroring
22
1. Re-deploy the Web and App servers with instance templates configured with respective service accounts. 2. Create an allow VPC firewall rule that specifies the target/source with respective service accounts.
23
1. Set up a Dedicated Interconnect link between the on-premises environment and Google Cloud. 2. Configure private access using the restricted.googleapis.com domains in on-premises DNS configurations.
24
Cloud Data Loss Prevention with cryptographic hashing
25
Create a Cloud Build pipeline that will monitor changes to your container templates in a Cloud Source Repositories repository. Add a step to analyze Container Analysis results before allowing the build to continue. , In your CI/CD pipeline, add an attestation on your container image when no vulnerabilities have been found. Use a Binary Authorization policy to block deployments of containers with no attestation in your cluster.
26
TCP/UDP Network
27
compute.restrictXpnProjectLienRemoval
28
Enable Firewall Rules Logging on the latest rules that were changed. Use Logs Explorer to analyze whether the rules are working correctly.
29
Turn off the domain restricted sharing organization policy. Set the policy value to "Custom." Add each external partner's Cloud Identity or Google Workspace customer ID as an exception under the organization policy, and then turn the policy back on.
30
The backend service's load balancing scheme must be EXTERNAL., The load balancer must be an external HTTP(S) load balancer.
31
Cloud NAT
32
Create a Log Sink at the organization level with the includeChildren parameter, and set the destination to a Pub/Sub topic., Enable Google Workspace audit logs to be shared with Google Cloud in the Admin Console.
33
Project
34
Use restricted googleapis.com to access Google APIs using a set of IP addresses only routable from within Google Cloud, which are advertised as routes over the Cloud Interconnect connection.
35
Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud Key Management Service.
36
Enable automatic key version rotation on a regular schedule., Limit the number of messages encrypted with each key version.
37
Project
38
Data Access
39
Use Pub/Sub and Cloud Functions to trigger a Cloud Data Loss Prevention scan every time a file is uploaded to the administrator's bucket. If the scan does not detect PII, have the function move the objects into the shared Cloud Storage bucket.
40
Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.
41
Event Threat Detection, Security Health Analytics
42
Titan Security Keys
43
Configure a VPC peering connection between your organization's VPC network and the third party's that is controlled by VPC firewall rules.
44
Identify inherited Identity and Access Management (IAM) roles on projects to be migrated., Remove the specific migration projects from any VPC Service Controls perimeters and bridges.
45
Organization Policy Service constraints
46
Enable an organization policy to prevent service account keys from being created.
47
On the Google Admin console, select the appropriate user account, and generate a backup code to allow the user to sign in. Ask the user to update their second factor.
48
Identity-Aware Proxy
49
Enable the dry run mode on your perimeter. Add your new access level to the perimeter dry run configuration. Update the perimeter configuration after the access level has been vetted.
50
Deploy an external HTTP(S) load balancer in the service project with the MIG as a backend.
PCSE 1-50
PCSE 1-50
Mark Joseph Tinawin · 50問 · 1年前PCSE 1-50
PCSE 1-50
50問 • 1年前PCSE 51-100
PCSE 51-100
Mark Joseph Tinawin · 50問 · 1年前PCSE 51-100
PCSE 51-100
50問 • 1年前PCSE 151-200
PCSE 151-200
Mark Joseph Tinawin · 50問 · 1年前PCSE 151-200
PCSE 151-200
50問 • 1年前PCSE 201-244
PCSE 201-244
Mark Joseph Tinawin · 44問 · 1年前PCSE 201-244
PCSE 201-244
44問 • 1年前問題一覧
1
Deterministic encryption
2
Billing Account Viewer, Billing Account Costs Manager
3
1. Use separate Google Cloud projects to store Production and Non-Production secrets. 2. Enforce access control to secrets using project-level identity and Access Management (IAM) bindings. 3. Use customer-managed encryption keys to encrypt secrets.
4
Enable Access Transparency logs with Access Approval requests for Google employees.
5
SSO SAML as a third-party IdP, Cloud Identity
6
Organize projects in folders, and assign permissions to Google groups at the folder level., Use Google Cloud Directory Sync to synchronize users and group memberships in Cloud Identity.
7
Web Security Scanner
8
Dedicated Interconnect
9
Cloud DNS with DNSSEC
10
Use the Logs Explorer to search for user activity.
11
Configure packet mirroring policies.
12
1. Configure the option to suspend domain users not found in LDAP. 2. Set up a recurring GCDS task.
13
Add the host project containing the Shared VPC to the service perimeter.
14
Firewall Insights
15
roles/logging.privateLogViewer
16
Change the access control model for the bucket
17
Create a custom service account for the cluster. Enable the constraints/iam.disableServiceAccountKeyCreation organization policy at the project level
18
1. Set up two VPC networks: one trusted and the other untrusted. 2. Configure a virtual appliance using multiple network interfaces, with each interface connected to one of the VPC networks.
19
Implement Identity-Aware Proxy TCP forwarding for the bastion host.
20
Dry Run
21
Packet Mirroring
22
1. Re-deploy the Web and App servers with instance templates configured with respective service accounts. 2. Create an allow VPC firewall rule that specifies the target/source with respective service accounts.
23
1. Set up a Dedicated Interconnect link between the on-premises environment and Google Cloud. 2. Configure private access using the restricted.googleapis.com domains in on-premises DNS configurations.
24
Cloud Data Loss Prevention with cryptographic hashing
25
Create a Cloud Build pipeline that will monitor changes to your container templates in a Cloud Source Repositories repository. Add a step to analyze Container Analysis results before allowing the build to continue. , In your CI/CD pipeline, add an attestation on your container image when no vulnerabilities have been found. Use a Binary Authorization policy to block deployments of containers with no attestation in your cluster.
26
TCP/UDP Network
27
compute.restrictXpnProjectLienRemoval
28
Enable Firewall Rules Logging on the latest rules that were changed. Use Logs Explorer to analyze whether the rules are working correctly.
29
Turn off the domain restricted sharing organization policy. Set the policy value to "Custom." Add each external partner's Cloud Identity or Google Workspace customer ID as an exception under the organization policy, and then turn the policy back on.
30
The backend service's load balancing scheme must be EXTERNAL., The load balancer must be an external HTTP(S) load balancer.
31
Cloud NAT
32
Create a Log Sink at the organization level with the includeChildren parameter, and set the destination to a Pub/Sub topic., Enable Google Workspace audit logs to be shared with Google Cloud in the Admin Console.
33
Project
34
Use restricted googleapis.com to access Google APIs using a set of IP addresses only routable from within Google Cloud, which are advertised as routes over the Cloud Interconnect connection.
35
Encrypt non-sensitive data with Google default encryption, and encrypt sensitive data with Cloud Key Management Service.
36
Enable automatic key version rotation on a regular schedule., Limit the number of messages encrypted with each key version.
37
Project
38
Data Access
39
Use Pub/Sub and Cloud Functions to trigger a Cloud Data Loss Prevention scan every time a file is uploaded to the administrator's bucket. If the scan does not detect PII, have the function move the objects into the shared Cloud Storage bucket.
40
Store the data in a Cloud Storage bucket, and configure the bucket's Object Lifecycle Management feature.
41
Event Threat Detection, Security Health Analytics
42
Titan Security Keys
43
Configure a VPC peering connection between your organization's VPC network and the third party's that is controlled by VPC firewall rules.
44
Identify inherited Identity and Access Management (IAM) roles on projects to be migrated., Remove the specific migration projects from any VPC Service Controls perimeters and bridges.
45
Organization Policy Service constraints
46
Enable an organization policy to prevent service account keys from being created.
47
On the Google Admin console, select the appropriate user account, and generate a backup code to allow the user to sign in. Ask the user to update their second factor.
48
Identity-Aware Proxy
49
Enable the dry run mode on your perimeter. Add your new access level to the perimeter dry run configuration. Update the perimeter configuration after the access level has been vetted.
50
Deploy an external HTTP(S) load balancer in the service project with the MIG as a backend.