What happens when you set an IAM policy with 'deny' permissions for a user?
AUser cannot access resources
BUser gains elevated access
CPolicy is ignored
DUser can always access remaining resources
Explanation
A 'deny' in IAM takes precedence, blocking access, while other options incorrectly describe IAM behavior.
Q52
Which Google Cloud storage class is best for infrequently accessed data?
ANearline Storage
BStandard Storage
CColdline Storage
DArchive Storage
Explanation
Nearline Storage is designed for data accessed less than once a month, while Coldline is for less frequent access, and Archive is for long-term storage.
Q53
A company needs to securely manage and delegate access to its GCP resources. Which service should it implement?
ACloud Identity
BAccess Context Manager
CCloud IAM
DCloud Monitoring
Explanation
Cloud IAM is specifically designed for managing access and roles for resources, while the other options serve different purposes.
Q54
What happens when a VM instance in GCP is stopped?
AAll data is permanently deleted
BCPU and memory are released
CThe VM becomes inaccessible forever
DStorage costs are eliminated
Explanation
Stopping a VM releases the CPU and memory, but the disk data remains intact and accessible later.
Q55
What service enables the scalable management of containerized applications?
AGoogle Kubernetes Engine
BGoogle Cloud Functions
CGoogle App Engine
DGoogle BigQuery
Explanation
Google Kubernetes Engine is designed specifically for containers, while the others focus on different application architectures.
Q56
A company needs to temporarily store large amounts of data for analysis. Which Google Cloud service is most cost-effective for this?
ACloud Pub/Sub
BCloud SQL
CCloud Storage
DBigQuery
Explanation
Cloud Storage is ideal for scalable, cost-effective data storage, while others have higher operational costs.
Q57
You are configuring Identity and Access Management (IAM) roles. What is a consequence of assigning a role with broad permissions?
AIncreased security risk
BSimpler access management
CFaster processing of requests
DEasier audit of permissions
Explanation
Broad permissions can lead to unauthorized access, while narrower roles improve security oversight.
Q58
Which service allows you to manage and analyze data securely at scale?
ABigQuery
BCloud Functions
CCloud Storage
DCloud Pub/Sub
Explanation
BigQuery is designed for large-scale data analysis, unlike the other options which serve different purposes.
Q59
A company needs to store sensitive customer information securely. Which feature should they implement?
AData Encryption
BLoad Balancing
CData Replication
DCache Optimization
Explanation
Data Encryption is essential for securing sensitive data, while the others do not focus on security.
Q60
You are configuring a Cloud Pub/Sub topic and want to limit message retention. What happens when the retention limit is reached?
AMessages are permanently deleted
BMessages are archived automatically
CMessages are saved temporarily
DMessages are sent to a backup
Explanation
Messages are deleted after the retention limit is pass, while the other options do not represent the actual behavior of Cloud Pub/Sub.