A company needs to securely store and share sensitive data. Which service should they use?
ACloud Firestore
BCloud Storage with Customer Encryption
CBigQuery
DDataproc
Explanation
Cloud Storage with Customer Encryption ensures secure data storage and sharing, unlike the other options that do not focus on sensitive data security.
Q222
What happens when a role is deleted from IAM?
AUsers lose all permissions immediately
BPermissions remain until session ends
CRole's permissions are transferred
DAffected users must reapply for roles
Explanation
Permissions tied to a deleted role are maintained until active sessions are closed.
Q223
Which service provides the ability to manage encryption keys?
ACloud Key Management Service
BCloud Functions
CCloud Run
DBigQuery
Explanation
Cloud Key Management Service manages encryption keys, while the others serve different purposes.
Q224
A company needs to monitor its applications for security threats in real-time. Which Google Cloud service should they use?
ACloud Logging
BCloud Security Command Center
CCloud Storage
DCloud Scheduler
Explanation
Cloud Security Command Center is designed for security threat monitoring, unlike the other options.
Q225
What happens when you set an IAM role with 'Deny' permissions in Google Cloud?
AAccess is always denied.
BIt overrides Allow permissions.
CRoles do not apply.
DOnly some permissions are denied.
Explanation
Deny permissions override any Allow permissions set for a user, while the other options are incorrect about IAM behavior.
Q226
Which service is used for identity management in GCP?
ACloud Identity
BBigQuery
CCloud Functions
DCloud Storage
Explanation
Cloud Identity provides user and group management; the others are unrelated services.
Q227
A company needs to encrypt data at rest for all its Google Cloud resources. Which method is preferred?
AUse Cloud KMS for customer-managed keys
BUse the default encryption only
CEncrypt data in application code
DUse public keys from GPG
Explanation
Cloud KMS allows for customer-managed encryption keys; the other options lack sufficient control or security.
Q228
You are configuring IAM permissions for Google Cloud resources. What happens when two conflicting roles are assigned to a user?
ALeast privilege is enforced
BAll permissions are denied
CMost privileged role is applied
DRole with earliest creation time is used
Explanation
In conflicts, the permissions of the highest privilege role are applied; the other options misunderstand IAM conflict resolution.
Q229
Which Google Cloud service is best for detecting threats in real time?
ACloud Security Scanner
BCloud Armor
CCloud Security Command Center
DIdentity-Aware Proxy
Explanation
Cloud Security Command Center provides real-time threat detection, while others serve different security functionalities.
Q230
A company needs to encrypt data at rest for compliance. Which Google Cloud service should they use?
ACloud Pub/Sub
BCloud Storage
CCloud Functions
DBigQuery
Explanation
Cloud Storage offers built-in encryption for data at rest; the others do not primarily focus on data storage.