🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 26 minutes remaining!

GCP Professional Cloud Security Engineer Practice Question

A media-streaming company ingests user activity logs that must be encrypted using envelope encryption before the data is written to BigQuery. During peak hours, the data-processing pipeline performs about 30,000 symmetric Encrypt or Decrypt operations per minute, distributed across several keys. The security policy requires that keys be protected in a module validated to at least FIPS 140-2 Level 1. There is no mandate for hardware-backed key storage. To keep latency and operational costs low while staying within default service quotas, which key-management approach should the team choose?

  • Store the keys in an on-premises HSM and access them through Cloud External Key Manager (EKM) for every encryption and decryption request.

  • Provision symmetric keys in Cloud HSM so each operation executes in a FIPS 140-2 Level 3 hardware security module.

  • Create symmetric software-protected keys in Cloud KMS and invoke the Encrypt and Decrypt API from the data-processing pipeline.

  • Implement client-side encryption with the Tink library and keep the master key material in an external HSM managed by the security team.

GCP Professional Cloud Security Engineer
Ensuring data protection
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot