A company needs to securely share data stored in Google Cloud Storage. Which is the best option?
APublic access settings
BSigned URLs
CBucket versioning
DCloud Functions
Explanation
Signed URLs enable controlled temporary access; public settings expose data widely.
Q102
You are configuring IAM roles for a cloud project. What happens if you assign 'roles/editor' to a user?
ARead-only access to resources
BManage resources and permissions
CNo access to resources
DView usage logs only
Explanation
'Roles/editor' provides broad management capabilities, while other options do not reflect this role's true permissions.
Q103
Which service allows you to manage IAM policies for your resources?
AGoogle Cloud Identity
BCloud Data Loss Prevention
CCloud Monitoring
DCloud Resource Manager
Explanation
Cloud Resource Manager is designed to manage IAM policies; others focus on different functions.
Q104
A company needs to secure its containerized applications on GKE. What should be prioritized?
ANetwork policy enforcement
BReducing node count
CUsing preemptible VMs
DIncreasing logging duration
Explanation
Network policies enforce access rules; others do not directly enhance security.
Q105
What happens when you enable VPC Service Controls for your Google Cloud project?
AAccess to APIs is blocked
BData exfiltration protections are added
CService accounts are disabled
DIAM roles are modified automatically
Explanation
VPC Service Controls enhance data security by preventing exfiltration; others do not.
Q106
Which Google Cloud service offers scalable object storage?
ACloud Storage
BCloud SQL
CCompute Engine
DBigQuery
Explanation
Cloud Storage is designed for scalable object storage; others serve different purposes.
Q107
A company needs to securely manage API keys for its applications on Google Cloud. What should they use?
ACloud Key Management Service
BSecret Manager
CIdentity and Access Management
DCloud Pub/Sub
Explanation
Secret Manager is best suited for managing sensitive information like API keys; other services focus on different functionalities.
Q108
You are configuring IAM roles for a new project. What happens if you mistakenly assign overly permissive roles?
AUsers may lose access immediately
BIt does not affect access rights
CUsers gain unnecessary permissions
DIAM roles will revert to defaults
Explanation
Overly permissive roles grant users unnecessary access which can pose security risks; other options are misleading about the effects of role assignments.
Q109
Which service helps manage IAM policies centrally?
ACloud Identity
BCloud Functions
CCloud Run
DCloud SQL
Explanation
Cloud Identity centralizes identity management, while others do not.
Q110
A company needs to audit GCP resource usage effectively. What should they implement?
ACloud Monitoring
BCloud Logging
CCloud Functions
DCloud Firestore
Explanation
Cloud Logging captures and allows auditing of all resource usage on GCP.