Question 98 of 300
mediummultiple choiceObjective-mapped

ACE Practice Question: A Cloud Storage bucket contains sensitive PII data

This ACE practice question tests your understanding of a cloud storage bucket contains sensitive pii data. Read the scenario carefully and evaluate each option against the stated constraints before committing to an answer. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.

A Cloud Storage bucket contains sensitive PII data. You need to ensure that objects in this bucket are encrypted using a key that your security team controls, and that the key can be revoked if needed to render all data inaccessible. Which encryption option should you use?

Question 1mediummultiple choice
Full question →

A Cloud Storage bucket contains sensitive PII data. You need to ensure that objects in this bucket are encrypted using a key that your security team controls, and that the key can be revoked if needed to render all data inaccessible. Which encryption option should you use?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Configure Customer-Managed Encryption Keys (CMEK) using Cloud KMS.

CMEK with Cloud KMS gives your security team full control: key creation, rotation, and revocation (disable/destroy). Disabling the KMS key renders all data encrypted with it inaccessible — cryptographic shredding.

B

Distractor review

Enable Cloud Storage's built-in server-side encryption with AES-256.

This is Google's default encryption — AES-256 server-side encryption with Google-managed keys. Your team does not control the key.

C

Distractor review

Use Google-managed encryption keys (default).

Default Google-managed keys are controlled by Google, not your security team. You cannot revoke them or audit their use independently.

D

Distractor review

Use Customer-Supplied Encryption Keys (CSEK) by embedding the key in each API request.

CSEK provides key control but requires your application to supply the key with every API call — operationally complex. CMEK via Cloud KMS is the managed solution for this requirement.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Key takeaway

Answer the scenario, not the keyword: identify the specific constraint before choosing the most familiar-sounding option.

Related practice questions

Related ACE practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Practice this exam

Start a free ACE practice session

Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.

FAQ

Questions learners often ask

What does this ACE question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Configure Customer-Managed Encryption Keys (CMEK) using Cloud KMS. — Customer-Managed Encryption Keys (CMEK) using Cloud KMS allows your security team to control the encryption keys used for Cloud Storage objects. The key is managed in Cloud KMS under your organization's control. If the key is disabled or destroyed, the encrypted data becomes permanently inaccessible (a 'cryptographic shredding' capability). CSEK (Customer-Supplied Encryption Keys) also provides control but requires the customer to supply the key material with every API call — harder to manage at scale.

What should I do if I get this ACE question wrong?

Identify which ACE exam domain this question belongs to, then review the specific concept being tested. Practise related questions in that domain and focus on understanding why each wrong answer is tempting — not just why the correct answer is right.

About these practice questions

Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →

How Courseiva writes practice questions · Editorial policy

Discussion

Loading comments…

Sign in to join the discussion.

This ACE practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the ACE exam.