Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Data Engineer Topic 4 Question 102 Discussion

Actual exam question for Google's Professional Data Engineer exam
Question #: 102
Topic #: 4
[All Professional Data Engineer Questions]

Which of these are examples of a value in a sparse vector? (Select 2 answers.)

Show Suggested Answer Hide Answer
Suggested Answer: C

To re-encrypt all of your CMEK-protected Cloud Storage data after a key has been exposed, and to ensure future writes are protected with a new key, creating a new Cloud KMS key and a new Cloud Storage bucket is the best approach. Here's why option C is the best choice:

Re-encryption of Data:

By creating a new Cloud Storage bucket and copying all objects from the old bucket to the new bucket while specifying the new Cloud KMS key, you ensure that all data is re-encrypted with the new key.

This process effectively re-encrypts the data, removing any dependency on the compromised key.

Ensuring CMEK Protection:

Creating a new bucket and setting the new CMEK as the default ensures that all future objects written to the bucket are automatically protected with the new key.

This reduces the risk of objects being written without CMEK protection.

Deletion of Compromised Key:

Once the data has been copied and re-encrypted, the old key can be safely deleted from Cloud KMS, eliminating the risk associated with the compromised key.

Steps to Implement:

Create a New Cloud KMS Key:

Create a new encryption key in Cloud KMS to replace the compromised key.

Create a New Cloud Storage Bucket:

Create a new Cloud Storage bucket and set the default CMEK to the new key.

Copy and Re-encrypt Data:

Use the gsutil tool to copy data from the old bucket to the new bucket while specifying the new CMEK key:

gsutil -o 'GSUtil:gs_json_api_version=2' cp -r gs://old-bucket/* gs://new-bucket/

Delete the Old Key:

After ensuring all data is copied and re-encrypted, delete the compromised key from Cloud KMS.


Cloud KMS Documentation

Cloud Storage Encryption

Re-encrypting Data in Cloud Storage

Contribute your Thoughts:

Kenny
22 hours ago
This question is so easy, even a kindergartener could get it right. B and C are the clear winners here.
upvoted 0 times
...
Nana
10 days ago
I'm going with B and D. Those two options have the fewest non-zero elements, which is the key characteristic of a sparse vector.
upvoted 0 times
...
Scot
15 days ago
Definitely B and C. A and D are too dense to be considered sparse vectors.
upvoted 0 times
Jettie
2 days ago
I think B and C are the correct answers.
upvoted 0 times
...
...
Kenneth
16 days ago
I think B and C are the correct answers. A and D have too many zeros, which doesn't align with the definition of a sparse vector.
upvoted 0 times
...
Martin
19 days ago
I'm not sure. Can you explain why A and C are considered sparse vectors?
upvoted 0 times
...
Jesusa
21 days ago
I agree with Titus. A and C have non-zero values at specific indices, making them sparse vectors.
upvoted 0 times
...
Titus
22 days ago
I think A and C are examples of values in a sparse vector.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77