Which service helps manage encryption keys in Google Cloud?
ACloud Key Management Service
BCloud Pub/Sub
CCloud Data Loss Prevention
DCloud Identity Aware Proxy
Explanation
Cloud Key Management Service securely rotates and manages keys; others don't focus on keys.
Q113
A company needs to ensure compliance with GDPR using Google Cloud. What should they implement?
ACloud Functions
BIAM Roles
CCloud Security Command Center
DData Loss Prevention API
Explanation
Data Loss Prevention API helps anonymize sensitive data for GDPR; others do not specifically address GDPR.
Q114
What happens when a Google Cloud VM's firewall allows all traffic?
AIncreased server performance
BEnhanced security posture
CVulnerability to attacks
DGuaranteed data privacy
Explanation
Allowing all traffic exposes the VM to potential attacks; the others suggest security or privacy improvements that are incorrect.
Q115
Which service offers encryption at rest by default?
AGoogle Cloud Storage
BGoogle App Engine
CGoogle Compute Engine
DGoogle Cloud Functions
Explanation
Google Cloud Storage provides encryption at rest by default, while other services may require additional configurations.
Q116
A company needs to ensure that only specific team members can access its Google Cloud resources. What should they configure?
AAPI keys
BFirewall rules
CIAM roles and permissions
DVPC peering
Explanation
IAM roles and permissions control access to resources effectively, unlike API keys or firewall rules.
Q117
What happens when you apply a DDoS protection policy to a Google Cloud Load Balancer?
ABlocks all incoming traffic
BLimits traffic from specific regions
CMonitors and mitigates attack traffic
DReduces load balancer performance
Explanation
DDoS protection policies help monitor and mitigate attack traffic to enhance security, not block all or reduce performance.
Q118
Which service provides DDoS protection for Google Cloud applications?
ACloud Armor
BCloud CDN
CFirewall Rules
DLoad Balancing
Explanation
Cloud Armor offers DDoS protection, whereas the others do not specifically address this issue.
Q119
A company needs to ensure its Google Cloud resources follow security compliance policies. What should they implement?
AIAM roles only
BOrganization policies
CCloud Storage permissions
DVPC networks
Explanation
Organization policies enforce security compliance standards across resources, while IAM roles manage access permissions.
Q120
You are configuring a service account in Google Cloud. What happens when you revoke its access?
ADeleted permanently
BCannot be used again
CAccess is immediately revoked
DAdds to audit logs only
Explanation
Revoking access immediately prevents the service account from authenticating or accessing resources, others do not reflect the true functionality.