You are configuring IAM roles. What happens when a user is granted the "Viewer" role on a project?
AUser can delete resources
BUser can modify resources
CUser can view resources only
DUser can create resources
Explanation
The "Viewer" role only allows viewing resources, with no permissions to modify or create.
Q232
A company needs to comply with GDPR. Which Google Cloud service aids in data residency and protection?
ACloud Storage
BCloud Pub/Sub
CData Loss Prevention
DCloud Firestore
Explanation
Data Loss Prevention (DLP) helps manage sensitive data, ensuring GDPR compliance, while others do not specifically address legal requirements.
Q233
You are configuring service accounts. What happens when you delete a service account with active IAM roles?
AIAM roles remain active indefinitely
BRoles transfer to another account
CRoles get deleted with account
DAccess is immediately revoked for users
Explanation
When a service account is deleted, all associated IAM roles are also removed, unlike other options.
Q234
Which Google service can be integrated for automated compliance checking?
ACloud Spanner
BCloud Asset Inventory
CBigQuery
DCloud Functions
Explanation
Cloud Asset Inventory tracks resources and enables compliance checking, while others serve different purposes.
Q235
Which Google Cloud service encrypts data at rest automatically?
ACloud Storage
BCloud Functions
CCloud Pub/Sub
DFirestore
Explanation
Cloud Storage encrypts data at rest automatically by default; other services may not handle encryption similarly.
Q236
A company needs to manage internal and external policies for its APIs. Which tool should they use?
ACloud IAM
BApigee API Management
CCloud Armor
DCloud Functions
Explanation
Apigee API Management provides features for managing API policies, unlike the other options.
Q237
What happens when an unauthorized user attempts to access a resource in Google Cloud with denied IAM permissions?
AAccess is granted temporarily.
BAccess is explicitly denied.
CUser receives a warning.
DResource is hidden from user.
Explanation
Access is explicitly denied, preventing unauthorized access, unlike warnings or resource hiding.
Q238
Which Google Cloud service is designed to secure workloads in containers?
AGoogle Kubernetes Engine
BCloud Run
CCloud Storage
DCloud Functions
Explanation
Google Kubernetes Engine provides built-in security features for containerized applications, unlike the other services.
Q239
A company needs to restrict access to a sensitive Cloud Storage bucket. What should they implement?
APublic Access Prevention
BDefault object permissions
CData Loss Prevention (DLP)
DIAM roles
Explanation
IAM roles properly control access, whereas the other options do not sufficiently restrict access.
Q240
What happens when you enable VPC Service Controls on a project?
AData exported to the public internet
BIncreased network latency
CEnhanced data security boundaries
DAutomatic service account creation
Explanation
VPC Service Controls enforce security boundaries around resources, while others do not provide security benefits.