You are configuring a Google Kubernetes Engine cluster with strict Pod security policies. What happens if a Pod requests elevated privileges?
AIt will be permitted automatically.
BThe Pod will be scheduled.
CThe Pod will be rejected.
DIt will require manual approval.
Explanation
Under strict Pod security policies, elevated privilege requests are rejected to enhance security, while other options suggest incorrect outcomes for policy enforcement.
Q292
Which service provides DDoS protection in Google Cloud?
ACloud Armor
BCloud Load Balancing
CCloud Pub/Sub
DCloud CDN
Explanation
Cloud Armor specifically protects against DDoS attacks; the others do not provide this feature.
Q293
A company needs to store sensitive data but wants to ensure compliance with regulations. Which Google Cloud service should they use for data classification?
ACloud KMS
BCloud Identity
CData Loss Prevention
DBigQuery
Explanation
Data Loss Prevention helps classify and protect sensitive data; others do not focus on data classification.
Q294
What happens when you configure a firewall rule to allow egress traffic but not ingress in Google Cloud?
AAll inbound traffic is blocked
BOnly outbound traffic is allowed
CNo traffic flows at all
DOnly authorized users can connect
Explanation
Allowing egress traffic means outbound is permitted; inbound traffic is controlled separately, so it won't be blocked unless configured.
Q295
Which service provides DDoS protection for applications?
ACloud Armor
BCloud Pub/Sub
CCloud Storage
DCloud Functions
Explanation
Cloud Armor is specifically designed for DDoS protection, while others serve different purposes.
Q296
A company needs to restrict access to sensitive data in BigQuery. What should they configure?
AIAM Roles
BCloud Functions
CBucket Policies
DCloud Run Permissions
Explanation
IAM Roles allow precise access management in BigQuery, while other options do not apply to it directly.
Q297
What happens when an organization uploads data with no encryption to Google Cloud Storage?
AData is stored as-is, unencrypted
BData is automatically encrypted at rest
CData must be decrypted first
DData is deleted immediately
Explanation
Data without encryption is stored in plaintext unless specified otherwise, while the other options misrepresent the behavior.
Q298
Which service allows secure access to VM instances?
AIdentity-Aware Proxy
BCloud Load Balancing
CCloud Pub/Sub
DCloud SQL
Explanation
Identity-Aware Proxy provides secure access, while others serve different purposes.
Q299
A company needs to monitor the security state of its GCP resources. Which tool should they use?
ACloud Resource Manager
BCloud Security Command Center
CCloud Monitoring
DCloud Identity
Explanation
Cloud Security Command Center focuses on security state, unlike the other tools.
Q300
What happens when you enable VPC flow logs?
ALogs are stored in GCS
BTraffic is encrypted
CLogs of IP traffic are collected
DVPC firewall rules are changed
Explanation
VPC flow logs capture IP traffic, while others describe different functionalities.