A company needs to secure sensitive data in BigQuery; what should they use?
ACloud Functions
BEncryption at Rest
CCloud Spanner
DCloud CDN
Explanation
Encryption at Rest ensures data is stored securely, which is essential for sensitive data.
Q192
What happens when you misconfigure IAM permissions on a GCP project?
AAll users lose access
BProject becomes unrecoverable
CCertain users get elevated access
DNo change in access levels
Explanation
Misconfiguration can inadvertently grant elevated access to users.
Q193
What happens when you enable VPC Flow Logs?
ALogs network traffic data
BIncreases data latency
CDisables external access
DRemoves firewall rules
Explanation
Enabling VPC Flow Logs captures and logs network traffic data; the other options are incorrect as they do not accurately describe the function of Flow Logs.
Q194
A company needs to encrypt their data at rest in Google Cloud Storage. Which service should they use?
AGoogle Cloud KMS
BGoogle Pub/Sub
CGoogle Cloud Functions
DGoogle Dataflow
Explanation
Google Cloud KMS (Key Management Service) is designed for managing encryption keys for data at rest, unlike the other services listed.
Q195
You are configuring IAM policies for a Google Cloud project. What happens if you grant a user both 'Viewer' and 'Editor' roles?
AUser has 'Editor' permissions
BUser loses 'Viewer' permissions
CUser is denied access
DPolicies conflict and break functionality
Explanation
In IAM, the most permissive role is applied, so the user has 'Editor' permissions despite having 'Viewer' as well; the other options are incorrect due to IAM's policy hierarchy.
Q196
Which service can provide DDoS protection for applications?
ACloud Armor
BCloud Data Loss Prevention
CCloud Interconnect
DCloud Pub/Sub
Explanation
Cloud Armor is specifically designed for DDoS protection, while the others serve different purposes.
Q197
A company needs to encrypt sensitive data at REST in Google Cloud. Which service should they use?
ACloud Spanner
BCloud Storage
CData Loss Prevention API
DBigQuery
Explanation
Cloud Storage supports server-side encryption for data at rest; other options either apply to different use cases or don't handle encryption directly.
Q198
What happens when you enable Audit Logging in a Google Cloud project?
ALogs all user activity immediately
BStops logging sensitive data
CLogs only IAM changes
DMonitors only network traffic
Explanation
Audit Logging captures all user activity, while the others limit logging scope or are unrelated tasks.
Q199
Which service provides managed encryption keys?
ACloud Key Management Service
BCloud Storage
CCloud Pub/Sub
DCloud Functions
Explanation
Cloud Key Management Service manages encryption keys, while the others provide different services.
Q200
A company needs to ensure VM instances have minimal access to the internet. What should they configure?
APrivate Google Access
BPublic IPs
CFirewall Rules
DCloud NAT
Explanation
Private Google Access allows secure access without public IPs, while the others do not restrict internet access effectively.