Free Google Professional-Cloud-Security-Engineer Exam Actual Questions

The questions for Professional-Cloud-Security-Engineer were last updated On May 4, 2025

At ValidExamDumps, we consistently monitor updates to the Google Professional-Cloud-Security-Engineer exam questions by Google. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the Google Professional Cloud Security Engineer exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by Google in their Google Professional-Cloud-Security-Engineer exam. These outdated questions lead to customers failing their Google Professional Cloud Security Engineer exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the Google Professional-Cloud-Security-Engineer exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

You need to use Cloud External Key Manager to create an encryption key to encrypt specific BigQuery data at rest in Google Cloud. Which steps should you do first?

Show Answer Hide Answer
Correct Answer: C

https://cloud.google.com/kms/docs/ekm#how_it_works

- First, you create or use an existing key in a supported external key management partner system. This key has a unique URI or key path.

- Next, you grant your Google Cloud project access to use the key, in the external key management partner system.

- In your Google Cloud project, you create a Cloud EKM key, using the URI or key path for the externally-managed key.


Question No. 2

You are migrating an on-premises data warehouse to BigQuery Cloud SQL, and Cloud Storage. You need to configure security services in the data warehouse. Your company compliance policies mandate that the data warehouse must:

* Protect data at rest with full lifecycle management on cryptographic keys

* Implement a separate key management provider from data management

* Provide visibility into all encryption key requests

What services should be included in the data warehouse implementation?

Choose 2 answers

Show Answer Hide Answer
Correct Answer: A, E

Customer-Managed Encryption Keys (CMEK):

CMEK allows you to manage encryption keys using Cloud Key Management Service (KMS). This gives you control over the lifecycle of the keys, including rotation, destruction, and auditing.

Set up a Cloud KMS key ring and create encryption keys that will be used to protect your data in BigQuery, Cloud SQL, and Cloud Storage.

Configure the services to use CMEK for encrypting data at rest, ensuring compliance with your organization's security policies.

Cloud External Key Manager (EKM):

Cloud EKM allows you to use keys managed by an external key management provider to encrypt data in Google Cloud services.

Integrate your external key management system with Google Cloud using supported protocols and APIs.

Configure your data warehouse services to use the external keys for encryption, ensuring that key management is handled outside of the Google Cloud environment.

Key Access Justifications:

Enable Key Access Justifications to provide visibility into why encryption keys are being accessed. This helps in monitoring and auditing key usage to ensure compliance and security.

Set up policies and logging to capture and review key access requests, providing insights into how and why keys are used.

Access Transparency and Approval:

Implement Access Transparency to gain visibility into Google's access to your data and encryption keys.

Configure Access Approval to require explicit approval for Google support or engineering access to your data, adding an additional layer of security and control.


Customer-Managed Encryption Keys (CMEK)

Cloud External Key Manager (EKM)

Key Access Justifications

Access Transparency

Access Approval

Question No. 3

Your security team uses encryption keys to ensure confidentiality of user dat

a. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).

Which steps should your team take before an incident occurs? (Choose two.)

Show Answer Hide Answer
Correct Answer: B, D

Enable automatic key version rotation on a regular schedule:

Regularly rotating keys reduces the impact of a potentially compromised key by limiting the amount of data encrypted with a single key version.

Set up automatic key rotation in Cloud KMS to ensure keys are rotated without manual intervention.

Limit the number of messages encrypted with each key version:

Reducing the number of messages encrypted with each key version minimizes the potential data exposure in case of a key compromise.

Implement policies to ensure that new key versions are used periodically to limit the usage of each key version.


Cloud KMS Key Rotation

Best Practices for Using Cryptographic Keys

Question No. 4

Your organization wants to protect all workloads that run on Compute Engine VM to ensure that the instances weren't compromised by boot-level or kernel-level malware. Also, you need to ensure that data in use on the VM cannot be read by the underlying host system by using a hardware-based solution.

What should you do?

Show Answer Hide Answer
Correct Answer: C

Use Google Shielded VM including secure boot Virtual Trusted Platform Module (vTPM) and integrity monitoring: Shielded VMs provide verifiable integrity of the VM by ensuring that it was not tampered with or compromised at the boot level. They use features like Secure Boot, vTPM, and integrity monitoring to detect and prevent malicious changes to the VM's operating system and firmware.

Activate Confidential Computing: Confidential Computing provides a secure environment for processing sensitive data. It uses hardware-based enclaves to protect data in use by ensuring it cannot be accessed by the underlying host or any other unauthorized entity. By leveraging Intel SGX or AMD SEV, it ensures that data remains encrypted even when it is being processed.

Enforce these actions by using organization policies: Organization policies can enforce the use of Shielded VMs and Confidential Computing across your organization. This ensures that all VMs comply with these security measures without requiring manual configuration for each VM.


Shielded VMs documentation

Confidential Computing documentation

Organization Policies documentation

Question No. 5

You are working with a client who plans to migrate their data to Google Cloud. You are responsible for recommending an encryption service to manage their encrypted keys. You have the following requirements:

The master key must be rotated at least once every 45days.

The solution that stores the master key must be FIPS 140-2 Level 3 validated.

The master key must be stored in multiple regions within the US for redundancy.

Which solution meets these requirements?

Show Answer Hide Answer
Correct Answer: B

To meet the requirements of rotating the master key every 45 days, achieving FIPS 140-2 Level 3 validation, and ensuring the master key is stored redundantly in multiple US regions, you should use Customer-managed encryption keys with Cloud HSM. Here's how:

Set Up Cloud HSM:

Deploy Cloud HSM in your Google Cloud environment. Cloud HSM provides a hardware-based key management solution that meets FIPS 140-2 Level 3 compliance.

Create and Manage Keys:

Create your encryption keys in Cloud HSM. These keys can be managed and rotated per your policy requirements.

Key Rotation:

Set up a key rotation schedule to rotate the master key every 45 days. Cloud HSM allows you to automate this process.

Geographic Redundancy:

Ensure that your Cloud HSM configuration spans multiple regions within the US to achieve redundancy. This will ensure that your keys are available even if a particular region experiences an outage.

Compliance:

Cloud HSM's FIPS 140-2 Level 3 validation ensures that your encryption keys are managed in a secure and compliant manner.

Benefits:

Security and Compliance: Meets stringent compliance requirements.

Automated Management: Simplifies key management and rotation.

Redundancy: Ensures high availability of keys across multiple regions.


Cloud HSM Documentation

Key Management with Cloud KMS and Cloud HSM