Professional Cloud Security Engineer - Google Cloud Certified Logo
Google Logo

Professional Cloud Security Engineer - Google Cloud Certified Exam Questions

391

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 11 Single Choice

Your team employs a service account to authenticate data transfers from a specific Compute Engine virtual machine instance to a designated Cloud Storage bucket. An engineer mistakenly deletes the service account, resulting in a disruption of application functionality. You aim to restore the application promptly without compromising security. What should you do?

Question 12 Single Choice

You are troubleshooting access denied errors between Compute Engine instances connected to a Shared VPC and BigQuery datasets. The datasets reside in a project protected by a VPC Service Controls perimeter. What should you do?

Question 13 Single Choice

You need to connect your organization's on-premises network with an existing Google Cloud environment that includes one Shared VPC with two subnets named Production and Non-Production. You are required to:

  • Use a private transport link.

  • Configure access to Google Cloud APIs through private API endpoints originating from on-premises environments.

  • Ensure that Google Cloud APIs are only consumed via VPC Service Controls.

What should you do?

Question 14 Single Choice

As a security engineer at a finance company, your organization intends to store data on Google Cloud. However, your leadership team is apprehensive about the security of their highly sensitive data, particularly regarding internal Google employees' access to your company's data on Google Cloud. What solution should you propose?

Question 15 Single Choice

To meet compliance reporting requirements, the internal audit department requests a semiannual list of virtual machines (VMs) with available critical operating system (OS) security updates that have not been installed. What action should you take to fulfill this request efficiently?

Question 16 Single Choice

To maintain compliance with CIS Google Cloud Computing Foundations Benchmark v1.3.0 (CIS Google Cloud Foundation 1.3), your organization seeks to continuously evaluate its security posture. However, some controls are irrelevant and should be excluded from evaluation. How can you establish an automated system or process to ensure that only the relevant controls are assessed?

Question 17 Single Choice

To safeguard against person-in-the-middle attacks, your company seeks to prevent unauthorized access to the Google Cloud environment via counterfeit login pages. Which security measure should be employed?

Question 18 Multiple Choice

Your company aims to transition most of its IT infrastructure to Google Cloud. They seek to integrate their existing on-premises Active Directory with Google Cloud for identity management. Which two steps should you take to achieve this integration and configure access management? (Choose two.)

Question 19 Single Choice

At AegisSoft Ltd, an application hosted on a Compute Engine VM needs to read data from a Cloud Storage bucket. For security compliance, the IT team prohibits public access to storage buckets and follows the principle of least privilege.

Which solution best satisfies the security requirements?

Question 20 Single Choice

You are exporting application logs to Cloud Storage. You encounter an error message stating that the log sinks don't support uniform bucket-level access policies. How should you resolve this error?

Page: 2 / 40