A company needs to ensure their Cloud Functions runtime is protected from VPC exposure. What should they configure?
AAllow unauthenticated invocations
BUse Serverless VPC Access connector
CDeploy only in public subnets
DAssociate static IP address
Explanation
Using a Serverless VPC Access connector enables Cloud Functions to connect securely to VPC without exposing them publicly.
Q432
What happens when you disable a Google Cloud IAM role on a project?
AUser retains their permissions
BRole permissions are immediately removed
CPermissions are overridden by higher roles
DExisting sessions remain unaffected
Explanation
When a role is disabled, all users assigned to it lose their corresponding permissions immediately.
Q433
Which Google Cloud service provides DDoS protection?
ACloud Armor
BCloud CDN
CLoad Balancing
DPub/Sub
Explanation
Cloud Armor offers DDoS protection, while others do not provide this specifically.
Q434
A company needs to manage access to resources using a resource hierarchy. What should they implement?
AService Accounts
BIAM Policies
CProjects and Folders
DVirtual Private Cloud
Explanation
Projects and folders create a hierarchy for managing access, unlike the other options.
Q435
What happens when a VM instance is deleted without a snapshot?
AData is permanently lost
BData is recoverable from the cloud
CVM state is saved
DInstance can be restarted later
Explanation
Deleting a VM without a snapshot results in permanent data loss, while other options are incorrect outcomes.
Q436
Which Google Cloud service provides DDoS protection?
AGoogle Cloud Armor
BGoogle Cloud Functions
CGoogle Cloud Pub/Sub
DGoogle Cloud Run
Explanation
Google Cloud Armor is specifically designed for DDoS protection, while the others serve different purposes.
Q437
A company needs to log access to sensitive data stored in BigQuery. Which feature should they use?
AAudit Logs
BAccess Control Lists
CData Encryption
DBucket Policies
Explanation
Audit Logs provide a record of access to BigQuery data, unlike the other options which serve different functions.
Q438
What happens when you configure a firewall rule to allow egress traffic to all IPs?
AOnly local traffic is allowed
BAll outbound traffic is permitted
CTraffic to the Internet is blocked
DOnly high-priority traffic is allowed
Explanation
Allowing egress traffic to all IPs permits unrestricted outbound connections, whereas the other options do not accurately describe the effect.
Q439
Which Google Cloud service provides DDoS attack protection?
ACloud Armor
BCloud Pub/Sub
CCloud Functions
DCloud Storage
Explanation
Cloud Armor defends applications against DDoS attacks; the other services do not provide direct DDoS protection.
Q440
A company needs to automatically rotate its Cloud IAM service account keys. Which service should they use?
ACloud Scheduler
BCloud Key Management
CSecret Manager
DCloud Functions
Explanation
Secret Manager securely manages and automates key rotation; the others do not handle automatic key rotation specifically.