A company needs to securely manage API access for its microservices. What should they implement?
AService Accounts
BCloud Storage
CBigQuery
DCloud Load Balancer
Explanation
Service Accounts provide secure identification and access management for APIs, the others do not serve this purpose.
Q282
What happens when two firewall rules contradict each other?
AFirst rule takes precedence
BTraffic is automatically blocked
CLast rule takes precedence
DBoth rules are ignored
Explanation
In Google Cloud, the most recently created rule takes precedence in case of a conflict.
Q283
Which service allows you to automate vulnerability scanning in GCP?
ASecurity Command Center
BCloud Armor
CCloud Functions
DCloud Run
Explanation
Security Command Center provides built-in vulnerability scanning, while the others do not focus on this function.
Q284
A company needs to securely store API keys. What is the recommended approach?
AStore in plain text files
BUse Secret Manager
CHard-code in source code
DStore in a database without encryption
Explanation
Using Secret Manager encrypts and manages sensitive data securely, unlike the other options.
Q285
What happens when setting IAM policies at the project-level?
AOverrides all organization policies
BCombines with organization policies
CNo effect if unused
DGrants permissions to all users
Explanation
Project-level IAM policies combine with organization policies to define effective permissions.
Q286
Which service should a company use to monitor security vulnerabilities in their Google Cloud environment?
ACloud Security Command Center
BCloud Functions
CCloud Run
DCloud CDN
Explanation
Cloud Security Command Center provides comprehensive security monitoring, while the other services do not focus on security monitoring.
Q287
What happens when a Google Cloud IAM policy is attached to a Cloud Storage bucket?
AIt controls access to the bucket.
BIt automatically encrypts all objects.
CIt sets the storage class.
DIt backs up data every day.
Explanation
IAM policies define access control for resources; the others do not directly relate to IAM policies.
Q288
You are configuring a VPC network with restrictive firewall rules. What will happen if a rule has 'deny all' at the end?
AAll traffic will be allowed.
BOnly specific traffic is allowed.
CNo traffic can pass through.
DIt causes a network outage.
Explanation
'Deny all' blocks all traffic not explicitly allowed by other rules, while A and B are incorrect interpretations of firewall behavior.
Q289
Which Google Cloud service is best for data encryption at rest?
ACloud Key Management Service
BCloud Pub/Sub
CCloud Functions
DCompute Engine
Explanation
Cloud Key Management Service provides key management solutions for encrypting data at rest, while other options do not specifically focus on encryption.
Q290
A company needs to ensure only authorized personnel can access sensitive bucket data. What practice should they adopt?
APublicly shared IAM roles
BPrivate Cloud Storage bucket
CLeast privilege access
DPrivacy data labeling
Explanation
Least privilege access minimizes unnecessary permissions to enhance data security, whereas other choices either do not provide sufficient security or limit access inappropriately.