Professional-Cloud-Security-Engineer Exam Question 16

You are on your company's development team. You noticed that your web application hosted in staging on GKE dynamically includes user data in web pages without first properly validating the inputted data. This could allow an attacker to execute gibberish commands and display arbitrary content in a victim user's browser in a production environment.
How should you prevent and fix this vulnerability?
  • Professional-Cloud-Security-Engineer Exam Question 17

    An organization adopts Google Cloud Platform (GCP) for application hosting services and needs guidance on setting up password requirements for their Cloud Identity account. The organization has a password policy requirement that corporate employee passwords must have a minimum number of characters.
    Which Cloud Identity password guidelines can the organization use to inform their new requirements?
  • Professional-Cloud-Security-Engineer Exam Question 18

    In a shared security responsibility model for IaaS, which two layers of the stack does the customer share responsibility for? (Choose two.)
  • Professional-Cloud-Security-Engineer Exam Question 19

    You will create a new Service Account that should be able to list the Compute Engine instances in the project. You want to follow Google-recommended practices.
    What should you do?
  • Professional-Cloud-Security-Engineer Exam Question 20

    Your team needs to configure their Google Cloud Platform (GCP) environment so they can centralize the control over networking resources like firewall rules, subnets, and routes. They also have an on-premises environment where resources need access back to the GCP resources through a private VPN connection. The networking resources will need to be controlled by the network security team.
    Which type of networking design should your team use to meet these requirements?