
Ultimate access to all questions.
You are tasked with setting up secure storage for sensitive files in Google Cloud Storage for your organization. According to Google's best practices and simplest design principles, what is the best approach to enforce security requirements and utilize encryption for the stored files?
A
Use Customer-Supplied Encryption Keys (CSEK) and specify a .boto file during upload with gsutil.
B
Utilize Google’s default encryption at rest.
C
Assign predefined IAM roles to the Google Groups created and utilize Google’s default encryption at rest when storing files.
D
Create and assign custom IAM roles to users for better security management.