GCP Professional Cloud Security Engineer Practice Question
Your organization is migrating its card-holder data environment to Google Cloud. Security and compliance teams have issued the following mandatory controls for every project that will reside in the existing "prod" folder:
No new Compute Engine VMs may be created with an external (ephemeral or static) IPv4 address.
All Cloud SQL instances must be created without a public IP address.
Any new regional or multiregional resource must be located only in europe-west2, europe-west3, or europe-north1. You need to implement these controls so they apply immediately to the current projects in the prod folder and automatically to any projects that will be created under that folder in the future. Other folders must remain unaffected. Which combination of Organization Policy constraints and settings meets all of the stated requirements?
Apply compute.vmExternalIpAccess with enforce: true, use the sql.disablePublicIp constraint, and allow only the EU multi-region in gcp.resourceLocations at the organization root.
Set compute.vmExternalIpAccess to allow all values, leave sql.restrictPublicIp disabled, and configure gcp.resourceLocations with a deny list that excludes us-* and asia-* regions on each individual project.
Enable the compute.requireOsLogin constraint, create an Assured Workloads EU environment for the prod folder, and apply the restrictXpnProjectLien constraint to all child projects.
On the prod folder, deny all values for the compute.vmExternalIpAccess list constraint, enforce the sql.restrictPublicIp boolean constraint, and configure gcp.resourceLocations with an allowed list limited to europe-west2, europe-west3, and europe-north1.
Attach three Organization Policy constraints to the prod folder:
For Compute Engine, apply the list constraint "constraints/compute.vmExternalIpAccess" with a policy rule that sets allValues: DENY (or a single deny value of "*") so that no VM can obtain an external IPv4 address, satisfying requirement 1.
Enable the boolean constraint "constraints/sql.restrictPublicIp" (set enforced: true) to block the creation of Cloud SQL instances with public IP addresses, meeting requirement 2.
Apply the list constraint "constraints/gcp.resourceLocations" with an allowed list that contains only europe-west2, europe-west3, and europe-north1, ensuring that new regional or multiregional resources are restricted to those three regions, meeting requirement 3. Because the policies are set on the prod folder, they are inherited by all existing and future projects within that folder while leaving resources in other folders unaffected.
The other options fail because they either allow external or public IPs, use incorrect or non-existent constraints, or apply the policies at the organization root, which would impact unrelated environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the compute.vmExternalIpAccess constraint used for?
Open an interactive chat with Bash
How does sql.restrictPublicIp ensure security for Cloud SQL instances?
Open an interactive chat with Bash
How does gcp.resourceLocations help enforce regional restrictions?
Open an interactive chat with Bash
What is an Organization Policy constraint in Google Cloud?
Open an interactive chat with Bash
How does the 'compute.vmExternalIpAccess' constraint work?
Open an interactive chat with Bash
What is the difference between a public IP and private IP in Google Cloud?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Supporting compliance requirements
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .