What happens when you set a Compute Engine instance to 'stopped' state?
AData is deleted
BBilling continues
CInstance can be restarted
DInstance becomes inaccessible
Explanation
A stopped instance retains data and can be restarted, while others misrepresent the state effects.
Q472
Which service provides centralized access control across Google Cloud resources?
AIdentity and Access Management (IAM)
BCloud Storage
CCloud Functions
DCompute Engine
Explanation
IAM manages permissions across resources, while others do not serve access control directly.
Q473
A company needs to securely regulate traffic to its API. What is the best approach?
AUse Cloud Firewalls to control requests
BEnable Stackdriver Logging for transparency
CImplement SSL certificates only
DAllow all traffic by default
Explanation
Cloud Firewalls effectively filter and control API traffic, unlike the others which do not directly enforce traffic restrictions.
Q474
What happens when a Google Cloud Storage bucket has uniform permissions applied?
APermissions apply only to objects
BAccess is limited to bucket creators
CAll objects inherit bucket permissions
DOnly predefined ACLs are used
Explanation
Uniform permissions mean all objects in the bucket inherit the bucket's permission settings, unlike other options which misinterpret permission relationships.
Q475
Which service offers hardware security modules in Google Cloud?
ACloud KMS
BCloud Functions
CApp Engine
DBigQuery
Explanation
Cloud KMS provides HSM capabilities for key management.
Q476
A company needs to restrict access to its Cloud Storage buckets to specific users based on their roles. What should they implement?
AService Accounts
BIAM Policies
CVPC Peering
DFirewall Rules
Explanation
IAM Policies control user access based on roles.
Q477
You are configuring a Google Cloud VPN. What happens when both sides have different tunnels configured?
ATraffic will only use one tunnel.
BBoth tunnels will be used suddenly.
CThe configuration will fail altogether.
DTraffic will balance between the tunnels.
Explanation
Only one tunnel is used for traffic unless configured otherwise.
Q478
Which Google Cloud service can help securely manage API keys?
ACloud Identity
BSecrets Manager
CCloud Functions
DCloud Pub/Sub
Explanation
Secrets Manager securely manages sensitive data like API keys, while others serve different purposes.
Q479
A company needs to ensure that all data in a Google Cloud Storage bucket remains encrypted at rest. What should they do?
AEnable Object Lifecycle Management
BSet Bucket Policy Only
CUse Google-managed encryption keys
DConfigure IAM roles on the bucket
Explanation
Google-managed keys automatically encrypt data at rest, while others don’t directly ensure encryption.
Q480
You are configuring firewall rules in Google Cloud. What happens if you set a rule with a priority of 1000?
AIt has the highest priority
BIt is ignored entirely
CIt has a low priority
DIt blocks all traffic
Explanation
Lower numerical values indicate higher priority, hence 1000 is a low priority.