Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 175 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 175
Topic #: 1
[All Professional Cloud Security Engineer Questions]

You are consulting with a client that requires end-to-end encryption of application data (including data in transit, data in use, and data at rest) within Google Cloud.
Which options should you utilize to accomplish this? (Choose two.)

  • A. External Key Manager
  • B. Customer-supplied encryption keys
  • C. Hardware Security Module
  • D. Confidential Computing and Istio
  • E. Client-side encryption
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
GHOST1985
Highly Voted 2 years, 1 month ago
Selected Answer: DE
Confidential Computing enables encryption for "data-in-use" Client Side encryption enables security for "data in transit" from Customer site to GCP Once data is at rest, use Google's default encryption for "data at rest"
upvoted 12 times
...
Baburao
Highly Voted 2 years, 2 months ago
I feel this should be DE. Confidential Computing enables encryption for "data-in-use" Client Side encryption enables security for "data in transit" from Customer site to GCP Once data is at rest, use Google's default encryption for "data at rest"
upvoted 8 times
...
DattaHinge
Most Recent 2 months ago
Selected Answer: BC
B. Customer-supplied encryption keys: This is crucial for achieving true end-to-end encryption. By providing your own encryption keys, you maintain complete control over the data, even Google Cloud cannot decrypt it without your keys. C. Hardware Security Module (HSM): HSMs provide a secure environment for storing and managing your encryption keys. This adds an extra layer of security, ensuring that your keys are protected from unauthorized access.
upvoted 1 times
...
MFay
6 months, 3 weeks ago
Answer BD. To accomplish end-to-end encryption of application data within Google Cloud, including data in transit, data in use, and data at rest, you should utilize the following options: B. Customer-supplied encryption keys - Customer-supplied encryption keys (CSEK) allow you to use your own encryption keys to protect your data at rest in Google Cloud, ensuring that your data is encrypted with keys that you control. D. Confidential Computing and Istio - Confidential Computing provides a hardware-based trusted execution environment (TEE) to protect data in use, ensuring that sensitive workloads and data remain encrypted while being processed. Istio can be used for securing data in transit within Google Cloud. Therefore, the correct answers are: **B. Customer-supplied encryption keys** **D. Confidential Computing and Istio**
upvoted 1 times
...
desertlotus1211
1 year, 2 months ago
I'll go with answer CD: https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets#creating-key
upvoted 2 times
...
Andrei_Z
1 year, 2 months ago
Selected Answer: BD
Option E (Client-side encryption) typically refers to encrypting data on the client side before sending it to the cloud, and it can complement the other options but is not one of the primary mechanisms for achieving end-to-end encryption within Google Cloud itself.
upvoted 2 times
desertlotus1211
1 year, 2 months ago
the key in the question is 'within GCP'... So E cannot be correct
upvoted 2 times
...
...
cyberpunk21
1 year, 3 months ago
Selected Answer: DE
D - Ensures encryption for data in use and transit E - Ensures Encryption at rest
upvoted 2 times
...
TNT87
1 year, 8 months ago
Selected Answer: BE
Why not B, E?
upvoted 1 times
gcpengineer
1 year, 6 months ago
how u will ensure data is getting encrypted at transit
upvoted 1 times
...
...
pmriffo
1 year, 11 months ago
https://cloud.google.com/compute/confidential-vm/docs/about-cvm#end-to-end_encryption
upvoted 1 times
...
Littleivy
2 years ago
Selected Answer: DE
Google Cloud customers with additional requirements for encryption of data over WAN can choose to implement further protections for data as it moves from a user to an application, or virtual machine to virtual machine. These protections include IPSec tunnels, Gmail S/MIME, managed SSL certificates, and Istio. https://cloud.google.com/docs/security/encryption-in-transit
upvoted 4 times
...
AwesomeGCP
2 years, 1 month ago
Selected Answer: DE
D. Confidential Computing and Istio E. Client-side encryption
upvoted 3 times
...
zellck
2 years, 1 month ago
Selected Answer: AE
AE is my answer.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...