New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Security Engineer Exam - Topic 2 Question 54 Discussion

Actual exam question for Google's Professional Cloud Security Engineer exam
Question #: 54
Topic #: 2
[All Professional Cloud Security Engineer Questions]

You are consulting with a client that requires end-to-end encryption of application data (including data in transit, data in use, and data at rest) within Google Cloud. Which options should you utilize to accomplish this? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

0/2000 characters
Merissa
4 months ago
I thought Confidential Computing was more for specific workloads, not general encryption.
upvoted 0 times
...
Ashton
4 months ago
Hardware Security Module is a must for strong security!
upvoted 0 times
...
Leonora
4 months ago
Wait, can you really use Customer-supplied encryption keys for data in use?
upvoted 0 times
...
Muriel
4 months ago
Definitely agree with that!
upvoted 0 times
...
Celestina
4 months ago
I think External Key Manager and Client-side encryption are solid choices.
upvoted 0 times
...
Clarinda
5 months ago
I’m leaning towards Customer-supplied encryption keys and Confidential Computing, but I’m not confident about the second option.
upvoted 0 times
...
Mose
5 months ago
I feel like Hardware Security Module could be relevant, but I can't recall if it covers all aspects of encryption we need here.
upvoted 0 times
...
Curt
5 months ago
I think External Key Manager and Client-side encryption were mentioned in a practice question we did. They seem like solid choices.
upvoted 0 times
...
Ty
5 months ago
I remember studying about end-to-end encryption, but I'm not entirely sure which options are best for data in use.
upvoted 0 times
...
Virgie
5 months ago
This question seems straightforward, but I want to make sure I understand it correctly before answering.
upvoted 0 times
...
Karma
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to review the DRM concepts and see if I can identify the right objects.
upvoted 0 times
...
Mary
5 months ago
Based on the scenario, I think the synthetic client is the way to go. That way we can monitor the availability from the user's perspective, which is really what we're trying to capture here.
upvoted 0 times
...

Save Cancel