GCP Professional Cloud Architect Practice Question

Your company, a multinational bank subject to strict financial regulations, is migrating 400 TB of payment records to BigQuery and Cloud Storage. Compliance mandates that: encryption keys remain under the bank's control in an HSM-backed store and are rotated every 90 days; Google personnel must not have access to key material; and incident response teams need the ability to instantly revoke data access if compromise is suspected, with minimal ongoing operational overhead. Which approach best meets these requirements?

  • Implement client-side encryption with open-source Tink libraries before uploading data and rely on Google-managed encryption for storage-layer protection, rotating keys in the application code.

  • Protect the datasets with Cloud KMS HSM-backed customer-managed encryption keys, enable automatic rotation every 90 days, and disable the key in KMS to revoke access when required.

  • Enable default Google-managed encryption and export Cloud Audit Logs to demonstrate that Google rotates the keys on the bank's behalf.

  • Use customer-supplied encryption keys delivered with each API call, store the keys in the bank's on-premises HSM, and manually rotate them every 90 days.

GCP Professional Cloud Architect
Designing for security and compliance
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot