<< Prev Question Next Question >>

Question 74/155

An organization's typical network and security review consists of analyzing application transit routes, request handling, and firewall rules. They want to enable their developer teams to deploy new applications without the overhead of this full review.
How should you advise this organization?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (155q)
Question 1: Your customer is moving their corporate applications to Goog...
Question 2: A manager wants to start retaining security event logs for 2...
Question 3: A website design company recently migrated all customer site...
Question 4: An organization wants to track how bonus compensations have ...
Question 5: Developers in an organization are prototyping a few applicat...
Question 6: You need to provide a corporate user account in Google Cloud...
Question 7: Your organization has on-premises hosts that need to access ...
Question 8: You are setting up a CI/CD pipeline to deploy containerized ...
Question 9: You are deploying a web application hosted on Compute Engine...
Question 10: A database administrator notices malicious activities within...
Question 11: Your Security team believes that a former employee of your c...
Question 12: Your Google Cloud organization is subdivided into three fold...
Question 13: Your organization is migrating a complex application to Goog...
Question 14: Your company conducts clinical trials and needs to analyze t...
Question 15: You work for a financial organization in a highly regulated ...
Question 16: Your organization utilizes Cloud Run services within multipl...
Question 17: An organization is starting to move its infrastructure from ...
Question 18: Your company must follow industry specific regulations. Ther...
Question 19: Your organization wants to be continuously evaluated against...
Question 20: Your organization operates in a highly regulated industry an...
Question 21: You are responsible for implementing a payment processing en...
Question 22: You plan to use a Google Cloud Armor policy to prevent commo...
Question 23: You are migrating your users to Google Cloud. There are cook...
Question 24: A customer wants to use Cloud Identity as their primary IdP....
Question 25: You are a Cloud Identity administrator for your organization...
Question 26: You want to protect the default VPC network from all inbound...
Question 27: You plan to deploy your cloud infrastructure using a CI/CD c...
Question 28: You want to make sure that your organization's Cloud Storage...
Question 29: Your organization is building a real-time recommendation eng...
Question 30: You have the following resource hierarchy. There is an organ...
Question 31: A company allows every employee to use Google Cloud Platform...
Question 32: Your team needs to make sure that their backend database can...
Question 33: Your company is using GSuite and has developed an applicatio...
Question 34: You are a member of your company's security team. You have b...
Question 35: A customer needs to rely on their existing user directory wi...
Question 36: A company is running their webshop on Google Kubernetes Engi...
Question 37: You are part of a security team that wants to ensure that a ...
Question 38: Your multinational organization is undergoing rapid expansio...
Question 39: You are troubleshooting access denied errors between Compute...
Question 40: An application running on a Compute Engine instance needs to...
Question 41: You just implemented a Secure Web Proxy instance on Google C...
Question 42: Your organization has applications that run in multiple clou...
Question 43: Your organization uses the top-tier folder to separate appli...
Question 44: The security operations team needs access to the security-re...
Question 45: Your security team wants to implement a defense-in-depth app...
Question 46: You are responsible for protecting highly sensitive data in ...
Question 47: You are responsible for managing your company's identities i...
Question 48: You are on your company's development team. You noticed that...
Question 49: A customer's data science group wants to use Google Cloud Pl...
Question 50: You need to follow Google-recommended practices to leverage ...
Question 51: When working with agents in a support center via online chat...
Question 52: Which type of load balancer should you use to maintain clien...
Question 53: As part of your organization's zero trust strategy, you use ...
Question 54: Your organization's Customers must scan and upload the contr...
Question 55: You have placed several Compute Engine instances in a privat...
Question 56: You are creating an internal App Engine application that nee...
Question 57: Your company has deployed an application on Compute Engine. ...
Question 58: What are the steps to encrypt data using envelope encryption...
Question 59: Your organization is using Vertex AI Workbench Instances. Yo...
Question 60: You work for a large organization that is using Cloud Identi...
Question 61: Your organization has hired a small, temporary partner team ...
Question 62: You will create a new Service Account that should be able to...
Question 63: A customer deploys an application to App Engine and needs to...
Question 64: You are a member of the security team at an organization. Yo...
Question 65: You are responsible for a set of Cloud Functions running on ...
Question 66: A cloud customer has an on-premises key management system an...
Question 67: Your organization's Google Cloud VMs are deployed via an ins...
Question 68: A retail customer allows users to upload comments and produc...
Question 69: You need to audit the network segmentation for your Google C...
Question 70: Your organization develops software involved in many open so...
Question 71: You are developing an application that runs on a Compute Eng...
Question 72: Your team needs to obtain a unified log view of all developm...
Question 73: Your organization previously stored files in Cloud Storage b...
Question 74: An organization's typical network and security review consis...
Question 75: After completing a security vulnerability assessment, you le...
Question 76: Your team needs to configure their Google Cloud Platform (GC...
Question 77: You manage multiple internal-only applications that are host...
Question 78: Users are reporting an outage on your public-facing applicat...
Question 79: A DevOps team will create a new container to run on Google K...
Question 80: Your company plans to move most of its IT infrastructure to ...
Question 81: You define central security controls in your Google Cloud en...
Question 82: Your company's cloud security policy dictates that VM instan...
Question 83: You are managing a Google Cloud environment that is organize...
Question 84: You are working with a client that is concerned about contro...
Question 85: Your security team uses encryption keys to ensure confidenti...
Question 86: You are setting up a new Cloud Storage bucket in your enviro...
Question 87: A company migrated their entire data/center to Google Cloud ...
Question 88: You have stored company approved compute images in a single ...
Question 89: Your organization is using Security Command Center Premium a...
Question 90: Your company's chief information security officer (CISO) is ...
Question 91: Which two implied firewall rules are defined on a VPC networ...
Question 92: You are deploying regulated workloads on Google Cloud. The r...
Question 93: The InfoSec team has mandated that all new Cloud Run jobs an...
Question 94: You plan to synchronize identities to Cloud Identity from a ...
Question 95: Your company is concerned about unauthorized parties gaining...
Question 96: You are the Security Admin in your company. You want to sync...
Question 97: Your application is deployed as a highly available, cross-re...
Question 98: Your team wants to centrally manage GCP IAM permissions from...
Question 99: You are implementing communications restrictions for specifi...
Question 100: You manage a BigQuery analytical data warehouse in your orga...
Question 101: A company's application is deployed with a user-managed Serv...
Question 102: You are a consultant for an organization that is considering...
Question 103: You want to limit the images that can be used as the source ...
Question 104: You work for a global company. Due to compliance requirement...
Question 105: You need to implement an encryption at-rest strategy that re...
Question 106: Your organization's record data exists in Cloud Storage. You...
Question 107: You are the security admin of your company. You have 3,000 o...
Question 108: Your organization has an internet-facing application behind ...
Question 109: You are running applications outside Google Cloud that need ...
Question 110: You need to implement an encryption-at-rest strategy that pr...
Question 111: You need to enforce a security policy in your Google Cloud o...
Question 112: Your Google Cloud environment has one organization node, one...
Question 113: A company has redundant mail servers in different Google Clo...
Question 114: You are working with developers to secure custom training jo...
Question 115: You work for a multinational organization that has systems d...
Question 116: You need to connect your organization's on-premises network ...
Question 117: Your organization 1s developing a new SaaS application on Go...
Question 118: A customer wants to run a batch processing system on VMs and...
Question 119: Your organization has two VPC Service Controls service perim...
Question 120: A patch for a vulnerability has been released, and a DevOps ...
Question 121: You manage a fleet of virtual machines (VMs) in your organiz...
Question 122: A security audit uncovered several inconsistencies in your p...
Question 123: Your organization is developing an application that will hav...
Question 124: Your company has been creating users manually in Cloud Ident...
Question 125: An organization receives an increasing number of phishing em...
Question 126: An organization is working on their GDPR compliance strategy...
Question 127: You are part of a security team investigating a compromised ...
Question 128: Your Google Cloud organization allows for administrative cap...
Question 129: When creating a secure container image, which two items shou...
Question 130: Your company is storing files on Cloud Storage. To comply wi...
Question 131: Your team creates an ingress firewall rule to allow SSH acce...
Question 132: You are in charge of creating a new Google Cloud organizatio...
Question 133: You recently joined the networking team supporting your comp...
Question 134: A company is using Google Kubernetes Engine (GKE) with conta...
Question 135: You are a security engineer at a finance company. Your organ...
Question 136: You are in charge of migrating a legacy application from you...
Question 137: Your organization recently activated the Security Command Ce...
Question 138: You are consulting with a client that requires end-to-end en...
Question 139: You are creating a new infrastructure CI/CD pipeline to depl...
Question 140: A Cloud Development team needs to use service accounts exten...
Question 141: A customer terminates an engineer and needs to make sure the...
Question 142: For compliance reasons, an organization needs to ensure that...
Question 143: You run a web application on top of Cloud Run that is expose...
Question 144: You work for a healthcare provider that is expanding into th...
Question 145: Your organization has an application hosted in Cloud Run. Yo...
Question 146: Your company's new CEO recently sold two of the company's di...
Question 147: A service account key has been publicly exposed on multiple ...
Question 148: Your organization wants to be General Data Protection Regula...
Question 149: Which two security characteristics are related to the use of...
Question 150: A customer needs an alternative to storing their plain text ...
Question 151: A company is deploying their application on Google Cloud Pla...
Question 152: A customer needs to launch a 3-tier internal web application...
Question 153: An organization is migrating from their current on-premises ...
Question 154: Your organization uses Google Cloud to process large amounts...
Question 155: Your company's Chief Information Security Officer (CISO) cre...