GCP Professional Cloud Security Engineer Practice Question

Your company hosts a public web application behind an external HTTP(S) load balancer on Google Cloud. A new compliance mandate requires that every client connection negotiate TLS 1.2 or later and that only ciphers providing perfect-forward-secrecy-explicitly excluding RC4, 3DES, and CBC suites-are offered. Backend services and Google-managed TLS certificates must remain unchanged. As the security engineer, what is the most operationally efficient way to enforce these requirements on every front-end listener of the load balancer?

  • Enable a Cloud Armor policy that blocks connections using disallowed ciphers or protocol versions before they reach the load balancer.

  • Configure each back-end VM to accept only TLS 1.2; the load balancer will automatically propagate the same restriction to clients.

  • Create a custom SSL policy (or use the built-in MODERN profile) with the minimum TLS version set to TLS_1_2 and apply it to the HTTPS target proxy used by the load balancer.

  • Upload a new custom certificate that lists only the approved cipher suites and enable mutual TLS on the back-end service.

GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot