Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 64 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 64
Topic #: 1
[All Professional Cloud Security Engineer Questions]

In an effort for your company messaging app to comply with FIPS 140-2, a decision was made to use GCP compute and network services. The messaging app architecture includes a Managed Instance Group (MIG) that controls a cluster of Compute Engine instances. The instances use Local SSDs for data caching and
UDP for instance-to-instance communications. The app development team is willing to make any changes necessary to comply with the standard
Which options should you recommend to meet the requirements?

  • A. Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module.
  • B. Set Disk Encryption on the Instance Template used by the MIG to customer-managed key and use BoringSSL for all data transit between instances.
  • C. Change the app instance-to-instance communications from UDP to TCP and enable BoringSSL on clients' TLS connections.
  • D. Set Disk Encryption on the Instance Template used by the MIG to Google-managed Key and use BoringSSL library on all instance-to-instance communications.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
subhala
Highly Voted 4 years ago
when I revisited this, Now I think A is correct. In A - We will use an approved encryption method for encrypting Local SSD and VM to VM communication. In B and D, we are still using GCP's encryption algorithms and are not FIPS 140-2 approved. Moreover only the BoringCrypto is FIPS 140-2 approved and not the Boring SSL. I see A as evidently correct. ownez, genesis3k, MohitA has explained this and provided the right links too.
upvoted 15 times
...
SQLbox
Most Recent 2 months, 1 week ago
B To comply with FIPS 140-2, the company needs to ensure that both data at rest and data in transit are encrypted using cryptographic libraries that are FIPS 140-2 certified. • Customer-managed keys (CMEK): Using customer-managed encryption keys (CMEK) in Google Cloud Key Management Service (KMS) ensures that encryption complies with FIPS 140-2 standards because the customer has control over the encryption keys and can ensure they are managed according to compliance requirements. • BoringSSL: A Google-maintained version of OpenSSL designed to be more streamlined and used in environments like Google Cloud, which includes support for FIPS 140-2 mode when linked to the BoringCrypto module. This library can be used to ensure that data in transit between instances is encrypted in compliance with FIPS.
upvoted 1 times
...
LaithTech
3 months, 2 weeks ago
Selected Answer: B
The correct answer is B
upvoted 1 times
...
3d9563b
4 months, 1 week ago
Selected Answer: B
A. Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module: BoringCrypto is not an established or widely recognized cryptographic library for FIPS 140-2 compliance. Instead, BoringSSL or OpenSSL with FIPS validation should be used for both data-at-rest and data-in-transit encryption. C. Change the app instance-to-instance communications from UDP to TCP and enable BoringSSL on clients' TLS connections: While changing from UDP to TCP might provide more reliable connections, it does not directly address FIPS 140-2 compliance. You still need to ensure that all data-in-transit encryption uses a validated cryptographic module such as BoringSSL. D. Set Disk Encryption on the Instance Template used by the MIG to Google-managed Key and use BoringSSL library on all instance-to-instance communications: Google-managed keys for disk encryption do not provide the level of control required for FIPS 140-2 compliance, which typically requires customer-managed keys for greater control and accountability.
upvoted 1 times
...
gical
11 months, 1 week ago
Selected answer B https://cloud.google.com/security/compliance/fips-140-2-validated/ "Google’s Local SSD storage product is automatically encrypted with NIST approved ciphers, but Google's current implementation for this product doesn’t have a FIPS 140-2 validation certificate. If you require FIPS-validated encryption on Local SSD storage, you must provide your own encryption with a FIPS-validated cryptographic module."
upvoted 4 times
b6f53d8
10 months, 3 weeks ago
YES, as in your link: you need to encrypt SSD using your own solution, and BoringSSL is a library to use
upvoted 1 times
...
...
ArizonaClassics
1 year, 2 months ago
A. Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module. This option ensures both storage (Local SSDs) and inter-instance communications are encrypted using a FIPS 140-2 compliant module.
upvoted 4 times
...
ArizonaClassics
1 year, 2 months ago
A. Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module. This option ensures both storage (Local SSDs) and inter-instance communications are encrypted using a FIPS 140-2 compliant module.
upvoted 1 times
...
ymkk
1 year, 2 months ago
Selected Answer: A
https://cloud.google.com/security/compliance/fips-140-2-validated/
upvoted 2 times
...
gcpengineer
1 year, 6 months ago
Selected Answer: A
A is the ans
upvoted 2 times
...
pedrojorge
1 year, 10 months ago
Selected Answer: C
"BoringSSL as a whole is not FIPS validated. However, there is a core library (called BoringCrypto) that has been FIPS validated" https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md
upvoted 3 times
...
AzureDP900
2 years ago
https://cloud.google.com/docs/security/key-management-deep-dive A is right
upvoted 1 times
...
AwesomeGCP
2 years, 1 month ago
Selected Answer: A
A. Encrypt all cache storage and VM-to-VM communication using the BoringCrypto module.
upvoted 1 times
...
sudarchary
2 years, 9 months ago
Selected Answer: A
FIPS140 module is supported
upvoted 2 times
...
[Removed]
3 years, 7 months ago
D is the correct answer
upvoted 2 times
...
DebasishLowes
3 years, 8 months ago
Ans : A
upvoted 1 times
...
TNT87
3 years, 8 months ago
https://cloud.google.com/security/compliance/fips-140-2-validated Google Cloud Platform uses a FIPS 140-2 validated encryption module called BoringCrypto (certificate 3318) in our production environment. This means that both data in transit to the customer and between data centers, and data at rest are encrypted using FIPS 140-2 validated encryption. The module that achieved FIPS 140-2 validation is part of our BoringSSL library. Ans A
upvoted 4 times
...
TNT87
3 years, 9 months ago
A is the answer https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...