<< Prev Question Next Question >>

Question 8/63

Your team needs to prevent users from creating projects in the organization. Only the DevOps team should be allowed to create projects on behalf of the requester.
Which two tasks should your team perform to handle this request? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (63q)
Question 1: A patch for a vulnerability has been released, and a DevOps ...
Question 2: You are part of a security team investigating a compromised ...
Question 3: A customer has 300 engineers. The company wants to grant dif...
Question 4: Your company has deployed an application on Compute Engine. ...
Question 5: Your organization has had a few recent DDoS attacks. You nee...
Question 6: You are a member of the security team at an organization. Yo...
Question 7: You are implementing data protection by design and in accord...
Question 8: Your team needs to prevent users from creating projects in t...
Question 9: An organization adopts Google Cloud Platform (GCP) for appli...
Question 10: What are the steps to encrypt data using envelope encryption...
Question 11: You discovered that sensitive personally identifiable inform...
Question 12: A company allows every employee to use Google Cloud Platform...
Question 13: You are asked to recommend a solution to store and retrieve ...
Question 14: You need to provide a corporate user account in Google Cloud...
Question 15: Your organization has implemented synchronization and SAML f...
Question 16: You are a security administrator at your company and are res...
Question 17: You work for a large organization where each business unit h...
Question 18: An organization is evaluating the use of Google Cloud Platfo...
Question 19: As adoption of the Cloud Data Loss Prevention (DLP) API grow...
Question 20: A customer's internal security team must manage its own encr...
Question 21: You need to set up two network segments: one with an untrust...
Question 22: You want to use the gcloud command-line tool to authenticate...
Question 23: You are responsible for protecting highly sensitive data in ...
Question 24: Your company's chief information security officer (CISO) is ...
Question 25: A customer is collaborating with another company to build an...
Question 26: The security operations team needs access to the security-re...
Question 27: You plan to use a Google Cloud Armor policy to prevent commo...
Question 28: An organization's security and risk management teams are con...
Question 29: You have created an OS image that is hardened per your organ...
Question 30: Which Identity-Aware Proxy role should you grant to an Ident...
Question 31: Your company requires the security and network engineering t...
Question 32: An engineering team is launching a web application that will...
Question 33: An organization is starting to move its infrastructure from ...
Question 34: You want data on Compute Engine disks to be encrypted at res...
Question 35: You are working with a client who plans to migrate their dat...
Question 36: You need to use Cloud External Key Manager to create an encr...
Question 37: Your company operates an application instance group that is ...
Question 38: Which two security characteristics are related to the use of...
Question 39: A large e-retailer is moving to Google Cloud Platform with i...
Question 40: For compliance reasons, an organization needs to ensure that...
Question 41: Your company plans to move most of its IT infrastructure to ...
Question 42: You are tasked with exporting and auditing security logs for...
Question 43: You manage your organization's Security Operations Center (S...
Question 44: A company is running workloads in a dedicated server room. T...
Question 45: A company has been running their application on Compute Engi...
Question 46: You are deploying a web application hosted on Compute Engine...
Question 47: You are the security admin of your company. You have 3,000 o...
Question 48: Your company runs a website that will store PII on Google Cl...
Question 49: An organization receives an increasing number of phishing em...
Question 50: A manager wants to start retaining security event logs for 2...
Question 51: In a shared security responsibility model for IaaS, which tw...
Question 52: A website design company recently migrated all customer site...
Question 53: You have been tasked with implementing external web applicat...
Question 54: An office manager at your small startup company is responsib...
Question 55: You want to update your existing VPC Service Controls perime...
Question 56: Your team uses a service account to authenticate data transf...
Question 57: You want to limit the images that can be used as the source ...
Question 58: When working with agents in a support center via online chat...
Question 59: You are backing up application logs to a shared Cloud Storag...
Question 60: A customer is running an analytics workload on Google Cloud ...
Question 61: A customer needs to launch a 3-tier internal web application...
Question 62: An employer wants to track how bonus compensations have chan...
Question 63: You need to audit the network segmentation for your Google C...