A company needs to audit API activity to increase security. What should they enable?
ACloud Logging
BCloud Metrics
CCloud Monitoring
DCloud Functions
Explanation
Cloud Logging retains logs of API activity; the others do not focus specifically on logging API actions.
Q252
What happens when you disable the Firewall Rule on a VM instance?
ANetwork traffic is immediately blocked
BTraffic is allowed to the VM
CAll traffic is logged immediately
DVM instance is terminated
Explanation
Disabling a Firewall Rule allows all incoming traffic; the other options describe incorrect behaviors.
Q253
Which Google Cloud service provides centralized identity management?
ACloud Identity
BCloud IAM
CCloud Storage
DCloud Functions
Explanation
Cloud Identity offers centralized management for users and groups, while IAM focuses on access management.
Q254
A company needs to secure its application on GCP from DDoS attacks. Which service should they implement?
ACloud Armor
BCloud Load Balancer
CCloud Firewall
DCloud CDN
Explanation
Cloud Armor is designed specifically to protect against DDoS attacks, unlike the other services.
Q255
You are configuring IAM roles for a project. What happens when a user has conflicting roles in IAM?
AOnly the highest role is applied
BAll roles are applied simultaneously
CLeast privilege is granted
DUser receives no access
Explanation
In IAM, if a user has conflicting roles, the highest role's permissions are prioritized.
Q256
Which service enables you to manage encryption keys in Google Cloud?
ACloud Key Management Service
BCloud Identity
CCloud Storage
DCloud IAM
Explanation
Cloud Key Management Service specifically manages encryption keys, while the others serve different purposes.
Q257
A company needs to log and monitor access to their Cloud Storage buckets. Which Google Cloud service should they use?
AStackdriver Logging
BCloud Security Command Center
CCloud Audit Logs
DCloud Monitoring
Explanation
Cloud Audit Logs specifically tracks access to Cloud Storage, while others are more general or for different uses.
Q258
What happens when you assign the `roles/owner` role to a user in a Google Cloud project?
AUser can manage everything in the project
BUser cannot manage IAM roles
CUser can only view project resources
DUser has project billing permissions only
Explanation
The `roles/owner` role grants full control over the project, unlike other options which are inaccurate limitations or scopes.
Q259
Which GCP service allows secure API access controls?
ACloud Identity and Access Management
BCloud Runtime Security
CCloud Functions Security
DCloud Data Loss Prevention
Explanation
Cloud IAM is specifically designed for managing access controls, whereas the other options do not primarily focus on API access management.
Q260
A company needs to securely manage encryption keys for their applications. Which GCP service should they use?
ACloud Storage
BCloud Key Management Service
CCloud Pub/Sub
DCloud Spanner
Explanation
Cloud Key Management Service is designed for managing encryption keys, while the other services handle different functionalities.