You are configuring a firewall rule to restrict traffic. What happens when you set the rule to deny all but specific IPs?
AOnly the specified IPs are allowed.
BAll traffic is allowed by default.
COnly firewall logs are generated.
DTraffic is denied for specific apps.
Explanation
Denying all except specific IPs only allows those specified, effectively blocking everything else.
Q72
A company needs high availability for its application running on GCP. Which option should they choose?
ASingle regional instance
BGlobal load balancer
CCompute Engine snapshot
DStatic IP address
Explanation
Global load balancers distribute traffic across multiple regions, ensuring high availability, unlike the other options which do not offer redundancy.
Q73
What happens when a VM is set to 'preemptible' in Google Cloud?
AAlways runs without interruption
BCan be shut down by Google
CCharges full price per hour
DHas higher availability than standard VMs
Explanation
Preemptible VMs can be terminated by Google at any time, making option B correct while A, C, and D are incorrect interpretations of their nature.
Q74
A company needs to restrict access to its sensitive data in Cloud Storage. Which service should they implement?
AIAM Roles and Permissions
BCloud Pub/Sub
CCloud Firestore
DCloud Functions
Explanation
IAM Roles and Permissions allow for secure access management, whereas the other options do not focus on access restriction.
Q75
You are configuring a VPN between your on-premises network and Google Cloud. What is crucial to ensure successful connectivity?
AMatch IP ranges in both setups
BUse only public IP addresses
CDisable Firewall rules initially
DSelect any encryption method
Explanation
Matching IP ranges is essential for routing traffic between the networks; B, C, and D could lead to connectivity issues.
Q76
Which service can you use to interconnect on-premises networks with Google Cloud?
ACloud Interconnect
BCloud Storage
CBigQuery
DApp Engine
Explanation
Cloud Interconnect provides connections between on-premises and Google Cloud; the other options do not serve this purpose.
Q77
A company needs to analyze network traffic for security threats. Which tool is most appropriate?
ACloud DNS
BCloud Armor
CVPC Flow Logs
DCloud IAM
Explanation
VPC Flow Logs captures metadata for network traffic, unlike the other options which serve different functions.
Q78
What happens when a Google Cloud Load Balancer's backend service becomes unhealthy?
AAll traffic is rerouted instantly
BTraffic is sent to other backends
CApplication shuts down automatically
DHealth checks are disabled
Explanation
Traffic is rerouted to healthy backends, while the other options are not accurate behaviors for backend service unhealthiness.
Q79
Which service in Google Cloud provides a managed Kubernetes environment?
AGoogle Kubernetes Engine
BCloud Run
CCloud Functions
DApp Engine
Explanation
Google Kubernetes Engine is a managed service for Kubernetes; others are not primarily for Kubernetes management.
Q80
A company needs to ensure that all network traffic between its VMs is encrypted. Which Google Cloud feature should they implement?
APrivate Google Access
BVPN Tunnel
CVPC Peering
DFirewall Rules
Explanation
A VPN Tunnel encrypts traffic between VMs; the other options don't focus on encryption directly.