Professional-Cloud-Security-Engineer Exam Question 1

You are on your company's development team. You noticed that your web application hosted in staging on GKE dynamically includes user data in web pages without first properly validating the inputted dat a. This could allow an attacker to execute gibberish commands and display arbitrary content in a victim user's browser in a production environment.
How should you prevent and fix this vulnerability?
  • Professional-Cloud-Security-Engineer Exam Question 2

    You have noticed an increased number of phishing attacks across your enterprise user accounts. You want to implement the Google 2-Step Verification (2SV) option that uses a cryptographic signature to authenticate a user and verify the URL of the login page. Which Google 2SV option should you use?
  • Professional-Cloud-Security-Engineer Exam Question 3

    Your organization uses Google Workspace Enterprise Edition tor authentication. You are concerned about employees leaving their laptops unattended for extended periods of time after authenticating into Google Cloud. You must prevent malicious people from using an employee's unattended laptop to modify their environment.
    What should you do?
  • Professional-Cloud-Security-Engineer Exam Question 4

    A customer wants to deploy a large number of 3-tier web applications on Compute Engine.
    How should the customer ensure authenticated network separation between the different tiers of the application?
  • Professional-Cloud-Security-Engineer Exam Question 5

    An organization's security and risk management teams are concerned about where their responsibility lies for certain production workloads they are running in Google Cloud Platform (GCP), and where Google's responsibility lies. They are mostly running workloads using Google Cloud's Platform-as-a-Service (PaaS) offerings, including App Engine primarily.
    Which one of these areas in the technology stack would they need to focus on as their primary responsibility when using App Engine?