A company needs to implement proactive threat detection on its GCP resources. Which tool should they use?
ACloud Armor
BCloud DLP
CCloud Security Command Center
DDataflow
Explanation
Cloud Security Command Center provides comprehensive security insight, unlike the other tools focused on different capabilities.
Q342
What happens when you assign a role to a GCP service account?
AService account credentials are revoked
BAccess permissions are modified according to the role
CProjects are deleted automatically
DIAM policies are bypassed
Explanation
Assigning a role modifies access permissions, while the other options misrepresent IAM behavior.
Q343
Which Google Cloud service is best for monitoring network traffic and identifying threats?
ACloud Armor
BNetwork Intelligence Center
CSecurity Command Center
DCloud Logging
Explanation
Security Command Center provides comprehensive threat detection, while others focus on different aspects of security.
Q344
A company needs to store sensitive data encrypted in transit and at rest. Which strategy should they use?
AUse only client-side encryption
BUse Google-managed encryption keys only
CUse SSL/TLS for data in transit and Google-managed encryption keys for data at rest
DUse public encryption keys
Explanation
Using SSL/TLS and Google-managed keys ensures both encryption in transit and at rest.
Q345
You are configuring IAM roles for a team working on multiple projects. What happens if a team member is assigned 'Viewer' role on a project and 'Editor' role on another?
AViewer role takes precedence.
BEditor role overrides the Viewer role.
CUser has view access only.
DUser has no access.
Explanation
Role-based access is additive, where the highest privileges apply to the user, which in this case is the Editor role.
Q346
Which service provides comprehensive threat detection and response on GCP?
ACloud Security Command Center
BCloud IAM
CCloud CDN
DCloud Filestore
Explanation
Cloud Security Command Center offers threat detection, while the others serve different purposes.
Q347
A company needs to restrict access to its GCP project only from specific IP addresses. What should they configure?
What happens when a service account is granted multiple conflicting IAM roles in GCP?
AAccess is denied
BLeast privilege takes effect
CUnion of permissions applies
DFirst role overrides others
Explanation
In GCP, the permissions from all roles are combined, resulting in the union of permissions.
Q349
Which service is best for managing secrets?
ASecret Manager
BCloud Storage
CBigQuery
DCloud Pub/Sub
Explanation
Secret Manager is specifically designed for managing secrets while the others serve different purposes.
Q350
You are configuring IAM roles for a GCP project. A user needs access to create Cloud Functions but cannot view other resources. What role should you assign?
ACloud Functions Developer
BViewer
CEditor
DOwner
Explanation
Cloud Functions Developer allows creation without viewing other resources; others provide broader access.