Professional Cloud Security Engineer
234
Professional Cloud Security Engineer
A: Limit the physical location of a new resource with the Organization Policy Service resource locations
B: Use Cloud IDS to get east-west and north-south traffic visibility in the EU to monitor intra-VPC and mter-VPC communication.
C: Limit Google personnel access based on predefined attributes such as their citizenship or geographic location by using Key Access Justifications
D: Use identity federation to limit access to Google Cloud resources from non-EU entities.
E: Use VPC Flow Logs to monitor intra-VPC and inter-VPC traffic in the EU.
A: Create a VPC Service Controls service perimeter across your existing Compute Engine VMs and Cloud Storage buckets
B: Migrate the Compute Engine VMs to Confidential VMs to access the sensitive data.
C: Configure Cloud External Key Manager to encrypt the sensitive data before it is uploaded to Cloud Storage and decrypt the sensitive data after it is downloaded into your VMs
D: Create Confidential VMs to access the sensitive data.
E: Configure Customer Managed Encryption Keys to encrypt the sensitive data before it is uploaded to Cloud Storage, and decrypt the sensitive data after it is downloaded into your VMs.
A: A* 1 Update the perimeter * 2 Configure the egressTo field to set identity Type to any_identity. * 3 Configure the egressFrom field to include the external Google Cloud project number as an allowed resource and the serviceName to compute. googleapis. com.
B: Allow the external project by using the organizational policy constraints/compute.trustedlmageProjects.
C: C* 1 Update the perimeter * 2 Configure the egressTo field to include the external Google Cloud project number as an allowed resource and the serviceName to compute. googleapis. com. * 3 Configure the egressFrom field to set identity Type to any_idestity.
D: * 1 Update the perimeter * 2 Configure the ingressFrcm field to set identityType to an-y_identity. * 3 Configure the ingressTo field to include the external Google Cloud project number as an allowed resource and the serviceName to compute.googleapis -com.
A: A firewall rule prevents the key from being accessible.
B: Cloud HSM does not support Cloud Storage
C: The CMEK is in a different project than the Cloud Storage bucket
D: The CMEK is in a different region than the Cloud Storage bucket.