What are the steps to encrypt data using envelope encryption?A.โ Generate a data encryption key (DEK) locally.โ Use a key encryption key (KEK) to wrap the DEK.โ Encrypt data with the KEK.โ Store the encrypted data and the wrapped KEK.B.โ Generate a key encryption key (KEK) locally.โ Use the KEK to generate a data encryption key (DEK).โ Encrypt data with the DEK.โ Store the encrypted data and the wrapped DEK.C.โ Generate a data encryption key (DEK) locally.โ Encrypt data with the DEK.โ Use a key encryption key (KEK) to wrap the DEK.โ Store the encrypted data and the wrapped DEK.D.โ Generate a key encryption key (KEK) locally.โ Generate a data encryption key (DEK) locally.โ Encrypt data with the KEK.Store the encrypted data and the wrapped DEK.
A customer wants to make it convenient for their mobile workforce to access a CRM web interface that is hosted on Google Cloud Platform (GCP). The CRM can only be accessed by someone on the corporate network. The customer wants to make it available over the internet. Your team requires an authentication layer in front of the application that supports two-factor authenticationWhich GCP product should the customer implement to meet these requirements?
Your company is storing sensitive data in Cloud Storage. You want a key generated on-premises to be used in the encryption process.What should you do?
Last week, a company deployed a new App Engine application that writes logs to BigQuery. No other workloads are running in the project. You need to validate that all data written to BigQuery was done using the App Engine Default Service Account.What should you do?
Your team wants to limit users with administrative privileges at the organization level.Which two roles should your team restrict? (Choose two.)
Your team needs to make sure that a Compute Engine instance does not have access to the internet or to any Google APIs or services.Which two settings must remain disabled to meet these requirements? (Choose two.)