exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 159 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 159
Topic #: 1
[All Professional Cloud Security Engineer Questions]

You discovered that sensitive personally identifiable information (PII) is being ingested to your Google Cloud environment in the daily ETL process from an on- premises environment to your BigQuery datasets. You need to redact this data to obfuscate the PII, but need to re-identify it for data analytics purposes. Which components should you use in your solution? (Choose two.)

  • A. Secret Manager
  • B. Cloud Key Management Service
  • C. Cloud Data Loss Prevention with cryptographic hashing
  • D. Cloud Data Loss Prevention with automatic text redaction
  • E. Cloud Data Loss Prevention with deterministic encryption using AES-SIV
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
GHOST1985
Highly Voted 2 years, 1 month ago
Selected Answer: BE
B: you need KMS to store the CryptoKey https://cloud.google.com/dlp/docs/reference/rest/v2/projects.deidentifyTemplates#crypt E: for the de-identity you need to use CryptoReplaceFfxFpeConfig or CryptoDeterministicConfig https://cloud.google.com/dlp/docs/reference/rest/v2/projects.deidentifyTemplates#cryptodeterministicconfig https://cloud.google.com/dlp/docs/deidentify-sensitive-data
upvoted 14 times
Ric350
1 year, 7 months ago
BE is correct. Ghost links are correct and this link here shows a reference architecture using cloud KMS and Cloud DLP https://cloud.google.com/architecture/de-identification-re-identification-pii-using-cloud-dlp
upvoted 6 times
...
...
mjcts
Most Recent 10 months ago
Selected Answer: BE
KMS for storing the encryption key Deterministic encryption so that you can reverse the process
upvoted 1 times
...
gkarthik1919
1 year, 1 month ago
BE are right. D is incorrect because automatic text redaction will remove the sensitive PII data which is not the requirement .
upvoted 2 times
...
anshad666
1 year, 2 months ago
Selected Answer: BE
looks viable
upvoted 1 times
...
gcpengineer
1 year, 5 months ago
why shd anyone use KMS to determine PII?
upvoted 1 times
YourFriendlyNeighborhoodSpider
1 month, 2 weeks ago
Good question.......
upvoted 1 times
...
...
gcpengineer
1 year, 5 months ago
Selected Answer: DE
DE is the ans
upvoted 1 times
gcpengineer
1 year, 5 months ago
BE is the answer
upvoted 1 times
...
...
AzureDP900
1 year, 12 months ago
B & E is right
upvoted 2 times
...
AwesomeGCP
2 years ago
Selected Answer: BE
B. Cloud Key Management Service E. Cloud Data Loss Prevention with deterministic encryption using AES-SIV
upvoted 4 times
...
zellck
2 years, 1 month ago
Selected Answer: BE
BE is the answer.
upvoted 4 times
...
waikiki
2 years, 1 month ago
No. As a result of checking the documentation, crypto key = This is a data encryption key (DEK) (as opposed to a key encryption key (KEK) stored by Cloud Key Management Service (Cloud KMS).
upvoted 1 times
Ric350
1 year, 7 months ago
It's BE. BE is correct. Ghost links are correct and this link here shows a reference architecture using cloud KMS and Cloud DLP https://cloud.google.com/architecture/de-identification-re-identification-pii-using-cloud-dlp
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago