GCP Professional Cloud Security Engineer Practice Question

As part of a zero-trust program, you must enable mutual TLS for many microservices that run on Compute Engine and multiple GKE clusters in several service projects. Internal traffic must use short-lived X.509 certificates automatically issued and rotated every 24 hours based on each workload's IAM service account identity. Operations teams need a single console to revoke any certificate immediately, and the solution must not rely on a publicly trusted root. Which architecture best meets these requirements while keeping operational overhead low?

  • Provision a private root CA with Certificate Authority Service, create subordinate CAs in a CA pool, and allow GKE and Compute Engine workloads to request and auto-renew 24-hour certificates through the Workload Certificate API (or Mesh CA) for mTLS.

  • Attach Google-managed SSL certificates to each Internal HTTP(S) Load Balancer and rely on the load balancers to terminate and re-encrypt traffic between services.

  • Generate a single wildcard certificate signed by an external public CA, store it in Secret Manager, and distribute it to every workload at startup through a custom script.

  • Purchase publicly trusted TLS certificates from Google Public CA and install them on every microservice to establish trust across projects.

GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot