New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Security Engineer Exam - Topic 2 Question 59 Discussion

Actual exam question for Google's Professional Cloud Security Engineer exam
Question #: 59
Topic #: 2
[All Professional Cloud Security Engineer Questions]

You want data on Compute Engine disks to be encrypted at rest with keys managed by Cloud Key Management Service (KMS). Cloud Identity and Access Management (IAM) permissions to these keys must be managed in a grouped way because the permissions should be the same for all keys.

What should you do?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Mohammad
4 months ago
I thought each KeyRing had to be unique to a Key, this is new info for me!
upvoted 0 times
...
Raymon
4 months ago
Definitely B, it's simpler to manage permissions that way.
upvoted 0 times
...
Ria
4 months ago
Wait, why would you create a KeyRing per disk? That sounds excessive!
upvoted 0 times
...
Rosio
4 months ago
I disagree, managing at the Key level seems more flexible.
upvoted 0 times
...
Helaine
4 months ago
Option B is the way to go for grouped IAM permissions!
upvoted 0 times
...
Billye
5 months ago
I feel like having a KeyRing per disk could complicate things, but I'm not confident about the best way to manage permissions.
upvoted 0 times
...
Lavera
5 months ago
I practiced a similar question where managing permissions at the Key level was emphasized, but I can't recall if that applies here.
upvoted 0 times
...
Latosha
5 months ago
I'm not entirely sure, but I think creating a single KeyRing for all disks might be the right approach. It seems more efficient.
upvoted 0 times
...
Michell
5 months ago
I remember we discussed how managing IAM permissions at the KeyRing level could simplify access control for multiple keys.
upvoted 0 times
...
Daren
5 months ago
This is a tricky one, but I'm going to give it my best shot. I'll make sure to read the question and answers thoroughly.
upvoted 0 times
...
Amie
5 months ago
I think this question is testing our understanding of the different types of proxy servers. I'm pretty sure the answer is A - Intercepting proxy server, since those are also known as transparent or forced proxies.
upvoted 0 times
...
Quentin
5 months ago
Ah, the Legacy Wrapper pattern sounds promising. I'll make sure to apply that along with the Standardized Service Contract principle to address the issues with Service A.
upvoted 0 times
...
Marica
10 months ago
Forget the keys, let's just encrypt everything with duct tape. That's the real Cloud KMS.
upvoted 0 times
Dick
8 months ago
C) Create a KeyRing per persistent disk, with each KeyRing containing a single Key. Manage the IAM permissions at the Key level.
upvoted 0 times
...
Meghan
8 months ago
B) Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the KeyRing level.
upvoted 0 times
...
Salina
9 months ago
A) Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the Key level.
upvoted 0 times
...
Boris
9 months ago
C) Create a KeyRing per persistent disk, with each KeyRing containing a single Key. Manage the IAM permissions at the Key level.
upvoted 0 times
...
Melinda
9 months ago
B) Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the KeyRing level.
upvoted 0 times
...
Rossana
9 months ago
A) Create a single KeyRing for all persistent disks and all Keys in this KeyRing. Manage the IAM permissions at the Key level.
upvoted 0 times
...
...
Carli
10 months ago
Ah, the joys of cloud infrastructure! I think I'll go with B - less keys, less problems, am I right?
upvoted 0 times
...
Lottie
10 months ago
This question is like a treasure hunt, but the treasure is just more bureaucracy. I'll go with B, just to keep things from getting too messy.
upvoted 0 times
Dacia
9 months ago
Yeah, B is the way to go to avoid unnecessary complexity.
upvoted 0 times
...
Glendora
9 months ago
I agree, B seems like the simplest option to manage IAM permissions.
upvoted 0 times
...
...
Sanjuana
10 months ago
Hmm, I'm torn between B and D. But I guess B makes more sense since it's less administrative overhead.
upvoted 0 times
...
Albert
10 months ago
But wouldn't managing permissions at the Key level provide more granular control over access to the keys?
upvoted 0 times
...
Sylvie
10 months ago
I disagree, I believe creating a KeyRing per persistent disk and managing IAM permissions at the KeyRing level would be more secure.
upvoted 0 times
...
Mitzie
11 months ago
Option B is the way to go! Manage the IAM permissions at the KeyRing level to keep things simple and streamlined.
upvoted 0 times
Geoffrey
9 months ago
Definitely. It's all about efficiency and security when it comes to managing access to sensitive data.
upvoted 0 times
...
Lorrine
9 months ago
I agree. It's important to keep things organized when dealing with encryption keys.
upvoted 0 times
...
Devora
9 months ago
That makes sense. It would be easier to manage permissions that way.
upvoted 0 times
...
Gilberto
10 months ago
Option B is the way to go! Manage the IAM permissions at the KeyRing level to keep things simple and streamlined.
upvoted 0 times
...
...
Albert
11 months ago
I think we should create a single KeyRing for all persistent disks and manage IAM permissions at the Key level.
upvoted 0 times
...

Save Cancel