Join the discussion
Question 1/107
A manager wants to start retaining security event logs for 2 years while minimizing costs. You write a filter to select the appropriate log entries.
Where should you export the logs?
Where should you export the logs?
Correct Answer: C
https://cloud.google.com/logging/docs/exclusions
Add Comments
- Other Question (107q)
- Q1. A manager wants to start retaining security event logs for 2 years while minimizing costs....
- Q2. An engineering team is launching a web application that will be public on the internet. Th...
- Q3. Your security team wants to implement a defense-in-depth approach to protect sensitive dat...
- Q4. A large financial institution is moving its Big Data analytics to Google Cloud Platform. T...
- Q5. You need to provide a corporate user account in Google Cloud for each of your developers a...
- Q6. A customer needs to prevent attackers from hijacking their domain/IP and redirecting users...
- Q7. Your team wants to make sure Compute Engine instances running in your production project d...
- Q8. You are in charge of migrating a legacy application from your company datacenters to GCP b...
- Q9. A customer needs to launch a 3-tier internal web application on Google Cloud Platform (GCP...
- Q10. Last week, a company deployed a new App Engine application that writes logs to BigQuery. N...
- Q11. Your team wants to centrally manage GCP IAM permissions from their on-premises Active Dire...
- Q12. A customer needs to prevent attackers from hijacking their domain/IP and redirecting users...
- Q13. Your company has been creating users manually in Cloud Identity to provide access to Googl...
- Q14. Your company has deployed an application on Compute Engine. The application is accessible ...
- Q15. Applications often require access to "secrets" - small pieces of sensitive data at build o...
- Q16. An organization is migrating from their current on-premises productivity software systems ...
- Q17. A customer wants to use Cloud Identity as their primary IdP. The customer wants to use oth...
- Q18. A manager wants to start retaining security event logs for 2 years while minimizing costs....
- Q19. Your organization has implemented synchronization and SAML federation between Cloud Identi...
- Q20. A DevOps team will create a new container to run on Google Kubernetes Engine. As the appli...
- Q21. Your team needs to configure their Google Cloud Platform (GCP) environment so they can cen...
- Q22. You discovered that sensitive personally identifiable information (PII) is being ingested ...
- Q23. You are in charge of migrating a legacy application from your company datacenters to GCP b...
- Q24. A manager wants to start retaining security event logs for 2 years while minimizing costs....
- Q25. You are responsible for protecting highly sensitive data in BigQuery. Your operations team...
- Q26. A customer needs to prevent attackers from hijacking their domain/IP and redirecting users...
- Q27. Your organization acquired a new workload. The Web and Application (App) servers will be r...
- Q28. You are responsible for protecting highly sensitive data in BigQuery. Your operations team...
- Q29. Your team wants to make sure Compute Engine instances running in your production project d...
- Q30. You need to implement an encryption-at-rest strategy that protects sensitive data and redu...
- Q31. You are setting up a CI/CD pipeline to deploy containerized applications to your productio...
- Q32. An organization is starting to move its infrastructure from its on-premises environment to...
- Q33. Your company's chief information security officer (CISO) is requiring business data to be ...
- Q34. A customer deploys an application to App Engine and needs to check for Open Web Applicatio...
- Q35. As adoption of the Cloud Data Loss Prevention (DLP) API grows within the company, you need...
- Q36. You are part of a security team that wants to ensure that a Cloud Storage bucket in Projec...
- Q37. A customer needs to launch a 3-tier internal web application on Google Cloud Platform (GCP...
- Q38. You are working with a client who plans to migrate their data to Google Cloud. You are res...
- Q39. An organization's typical network and security review consists of analyzing application tr...
- Q40. Your team needs to obtain a unified log view of all development cloud projects in your SIE...
- Q41. You are in charge of migrating a legacy application from your company datacenters to GCP b...
- Q42. Your team sets up a Shared VPC Network where project co-vpc-prod is the host project. Your...
- Q43. When working with agents in a support center via online chat, an organization's customers ...
- Q44. A company is deploying their application on Google Cloud Platform. Company policy requires...
- Q45. While migrating your organization's infrastructure to GCP, a large number of users will ne...
- Q46. Your company is using GSuite and has developed an application meant for internal usage on ...
- Q47. A company has been running their application on Compute Engine. A bug in the application a...
- Q48. A customer wants to run a batch processing system on VMs and store the output files in a C...
- Q49. You have defined subnets in a VPC within Google Cloud Platform. You need multiple projects...
- Q50. Your security team uses encryption keys to ensure confidentiality of user dat a. You want ...
- Q51. Your team needs to make sure that a Compute Engine instance does not have access to the in...
- Q52. You are on your company's development team. You noticed that your web application hosted i...
- Q53. You need to follow Google-recommended practices to leverage envelope encryption and encryp...
- Q54. A customer is running an analytics workload on Google Cloud Platform (GCP) where Compute E...
- Q55. A company's application is deployed with a user-managed Service Account key. You want to u...
- Q56. You are the security admin of your company. You have 3,000 objects in your Cloud Storage b...
- Q57. You have been tasked with implementing external web application protection against common ...
- Q58. You are a member of your company's security team. You have been asked to reduce your Linux...
- Q59. You are part of a security team that wants to ensure that a Cloud Storage bucket in Projec...
- Q60. A company is running workloads in a dedicated server room. They must only be accessed from...
- Q61. You are exporting application logs to Cloud Storage. You encounter an error message that t...
- Q62. Your company is using GSuite and has developed an application meant for internal usage on ...
- Q63. You are the Security Admin in your company. You want to synchronize all security groups th...
- Q64. A company is running their webshop on Google Kubernetes Engine and wants to analyze custom...
- Q65. A customer needs to rely on their existing user directory with the requirements of native ...
- Q66. Developers in an organization are prototyping a few applications on Google Cloud Platform ...
- Q67. You need to audit the network segmentation for your Google Cloud footprint. You currently ...
- Q68. A company allows every employee to use Google Cloud Platform. Each department has a Google...
- Q69. You work for an organization in a regulated industry that has strict data protection requi...
- Q70. Your company's Chief Information Security Officer (CISO) creates a requirement that busine...
- Q71. As adoption of the Cloud Data Loss Prevention (DLP) API grows within the company, you need...
- Q72. A customer wants to move their sensitive workloads to a Compute Engine-based cluster using...
- Q73. An engineering team is launching a web application that will be public on the internet. Th...
- Q74. A company has been running their application on Compute Engine. A bug in the application a...
- Q75. Which two implied firewall rules are defined on a VPC network? (Choose two.)...
- Q76. Which international compliance standard provides guidelines for information security contr...
- Q77. You want to evaluate GCP for PCI compliance. You need to identify Google's inherent contro...
- Q78. You want to evaluate GCP for PCI compliance. You need to identify Google's inherent contro...
- Q79. An organization's typical network and security review consists of analyzing application tr...
- Q80. You want to limit the images that can be used as the source for boot disks. These images w...
- Q81. You are the project owner for a regulated workload that runs in a project you own and mana...
- Q82. You have been tasked with inspecting IP packet data for invalid or malicious content. What...
- Q83. In order to meet PCI DSS requirements, a customer wants to ensure that all outbound traffi...
- Q84. An organization recently began using App Engine to build and host its new web application ...
- Q85. A customer needs to launch a 3-tier internal web application on Google Cloud Platform (GCP...
- Q86. A customer wants to make it convenient for their mobile workforce to access a CRM web inte...
- Q87. A patch for a vulnerability has been released, and a DevOps team needs to update their run...
- Q88. You need to provide a corporate user account in Google Cloud for each of your developers a...
- Q89. An organization receives an increasing number of phishing emails. Which method should be u...
- Q90. You are troubleshooting access denied errors between Compute Engine instances connected to...
- Q91. You are part of a security team investigating a compromised service account key. You need ...
- Q92. In order to meet PCI DSS requirements, a customer wants to ensure that all outbound traffi...
- Q93. Your privacy team uses crypto-shredding (deleting encryption keys) as a strategy to delete...
- Q94. An organization is working on their GDPR compliance strategy. It wants to ensure that cont...
- Q95. In an effort for your company messaging app to comply with FIPS 140-2, a decision was made...
- Q96. Your team wants to limit users with administrative privileges at the organization level Wh...
- Q97. An organization is starting to move its infrastructure from its on-premises environment to...
- Q98. You are responsible for implementing a payment processing environment that will use Kubern...
- Q99. A customer's company has multiple business units. Each business unit operates independentl...
- Q100. A security team at an e-commerce company wants to define an automatic incident response pr...
- Q101. A company's application is deployed with a user-managed Service Account key. You want to u...
- Q102. You have the following resource hierarchy. There is an organization policy at each node in...
- Q103. You need to follow Google-recommended practices to leverage envelope encryption and encryp...
- Q104. You need to follow Google-recommended practices to leverage envelope encryption and encryp...
- Q105. You perform a security assessment on a customer architecture and discover that multiple VM...
- Q106. You are creating an internal App Engine application that needs to access a user's Google D...
- Q107. You work for a large organization where each business unit has thousands of users. You nee...
[×]
Download PDF File
Enter your email address to download Google.Professional-Cloud-Security-Engineer.v2022-12-30.q107.pdf
