🔒 Ensuring Data Protection - PCSE Practice Questions

Manage encryption, Cloud KMS, DLP, data classification, and data governance for Google Cloud.

5Questions Available
1Exam Domains

Practice Data Protection Questions Now

Start a timed practice session focusing on Ensuring Data Protection topics from the PCSE question bank.

Start PCSE Practice Quiz →

PCSE Data Protection Question Bank (5 Questions)

Browse all 5 practice questions covering Ensuring Data Protection for the PCSE certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Ensuring Data Protection

    How do you implement Customer-Managed Encryption Keys (CMEK) for BigQuery?

    ABigQuery doesn't support CMEK
    BCreate a key in Cloud KMS, grant BigQuery service account the Encrypter/Decrypter role, and specify the key when creating the dataset — all tables inherit the encryption key
    CUpload your own key file
    DCMEK is automatic
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    CMEK for BigQuery: 1) Create key ring + key in Cloud KMS (same region as dataset). 2) Grant: roles/cloudkms.cryptoKeyEncrypterDecrypter to BigQuery SA (bq-PROJECT_NUMBER@bigquery-encryption.iam.gserviceaccount.com). 3) Create dataset: --default_kms_key=projects/.../keys/my-key. Tables use dataset key by default. Benefits: you control key lifecycle (disable key → data inaccessible), key rotation, audit key usage. Required for: many compliance frameworks.

  2. Question 2Ensuring Data Protection

    How do you implement encryption key rotation in Cloud KMS?

    AManually create new keys
    BConfigure automatic key rotation periods (e.g., 90 days) in Cloud KMS — new key versions are created automatically, old versions remain for decryption of existing data
    CRotation is not needed
    DDelete old keys immediately
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Key rotation in Cloud KMS: automatic rotation: set rotation period (e.g., every 90 days). New primary version created automatically. Old versions: remain ENABLED for decryption of data encrypted with them. Re-encryption: optional (encrypt data with new version for compliance). Destroy: schedule old version destruction after re-encryption (24-hour default destruction delay). Manual rotation: create new version on demand. Monitor: key version usage.

  3. Question 3Ensuring Data Protection

    What is Customer-Managed Encryption Keys (CMEK)?

    AGoogle-managed keys
    BEncryption keys that you create and manage in Cloud KMS, used to encrypt Google Cloud resources, giving you control over key lifecycle, rotation, and access
    CSelf-managed hardware
    DNo encryption
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    CMEK: create keys in Cloud KMS, configure resources (GCS, BigQuery, Compute Engine, Cloud SQL) to use your keys. Benefits: control key rotation, key access (IAM), key destruction (delayed), and audit key usage (Cloud Audit Logs). Required for some compliance frameworks.

  4. Question 4Protecting Data

    What are customer-managed encryption keys (CMEK)?

    ADefault encryption only
    BEncryption keys managed by the customer in Cloud KMS, used to encrypt GCP resources (BigQuery, GCS, Compute Engine disks, Cloud SQL) — providing control over key lifecycle, rotation, and access
    CAutomatic keys
    DThird-party encryption
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    CMEK: create key in Cloud KMS → configure GCP service to use your key. Benefits: control key lifecycle (create, rotate, disable, destroy), audit key usage (Cloud Audit Logs), restrict access (IAM on key), and comply with key management regulations. Support: GCS (bucket/object), BigQuery (dataset/table), Compute Engine (disk), Cloud SQL, GKE, Pub/Sub, Spanner, and more. Key rotation: automatic (configurable period) or manual. CMEK vs CSEK: CMEK in KMS, CSEK customer-supplied per request.

  5. Question 5Ensuring Data Protection

    What is the difference between CMEK and CSEK?

    ANo difference
    BCMEK uses keys in Cloud KMS (you control the key, Google manages encryption); CSEK uses keys you provide with each API call (you manage everything)
    CCSEK is managed by Google
    DCMEK is less secure
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    CMEK: key stored in Cloud KMS, you control rotation/access, Google handles encryption operations. CSEK: you supply the key with each request, Google never stores it — maximum customer control.

Key Data Protection Concepts for PCSE

encryptionkmsdlpcmekcsekdata classificationdata governance

PCSE Data Protection Exam Tips

Ensuring Data Protection questions in PCSE are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: encryption, kms, dlp, cmek, csek, data classification.

What PCSE Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Data Protection scenarios for PCSE are frequently mapped to Domain 3 (~20%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Data Protection interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Professional) and managed-service best practices.

High-Value Data Protection Concepts

  • Know the core Data Protection building blocks cold: encryption, kms, dlp, cmek.
  • Review the edge-case features and limits for csek, data classification; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Data Protection pairs with Access Management, Compliance in real deployment patterns.
  • For PCSE, explain why the chosen Data Protection design meets reliability, security, and cost expectations better than the alternatives.

Common PCSE Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Data Protection often include distractors that look correct for Data Protection but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Data Protection implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Data Protection (~20%) outcomes for PCSE?
  • Can you explain security and access boundaries for Data Protection without relying on default-open assumptions?
  • Can you describe how Data Protection integrates with Access Management and Compliance during failure, scaling, and monitoring events?

Exam Domains Covering Data Protection

Related Resources

More PCSE Study Resources