A company needs to secure APIs using OAuth 2.0 with Google Cloud. Which service should they use?
ACloud Endpoints
BCloud Functions
CCloud Run
DCloud Storage
Explanation
Cloud Endpoints allows secure API management with OAuth 2.0, while the others are not specifically designed for this use case.
Q42
What happens when you configure a virtual machine with default settings in Google Cloud?
AExposed to public internet
BInstalls extra security measures
CAutomatically encrypts all data
DDefault service account is disabled
Explanation
By default, VMs allow external traffic unless configured otherwise; the other options are incorrect behaviors.
Q43
Which Google Cloud service is best for managing access across projects?
ACloud IAM
BCloud Functions
CCloud Storage
DBigQuery
Explanation
Cloud IAM allows for granular access control, whereas the others serve different functions.
Q44
A company needs to secure sensitive data in transit. Which tool should they use to encrypt this data?
AVPC Service Controls
BCloud Armor
CCloud Data Loss Prevention
DCloud Pub/Sub
Explanation
VPC Service Controls provide advanced data protection, while the others do not specifically address encryption in transit.
Q45
What happens when a service account is deleted in Google Cloud?
AAll access credentials are revoked.
BUser access is unaffected.
COnly the IAM roles remain.
DThe service account can be restored.
Explanation
Deleting a service account revokes all its credentials and permissions; the others incorrectly imply retention of access or the ability to restore.
Q46
Which Google Cloud service is ideal for DDoS protection?
AGoogle Cloud Armor
BCloud Load Balancing
CCloud CDN
DData Loss Prevention
Explanation
Google Cloud Armor provides DDoS protection while the others do not specialize in this functionality.
Q47
A company needs to ensure its IAM roles have minimum privileges for users. Which principle should they implement?
ALeast Privilege Principle
BRole-based Access Control
CAtomic Security Model
DSingle Sign-On Implementation
Explanation
The Least Privilege Principle ensures users only have necessary permissions.
Q48
You are configuring logging for a Cloud Function that processes sensitive data. What happens when you set the log level to 'Debug'?
AOnly errors are logged.
BAll function invocations are logged.
CSensitive data is excluded from logs.
DMore detailed logs include sensitive data.
Explanation
Setting 'Debug' increases verbosity and may log sensitive information, unlike the error-only setting.
Q49
Which service provides firewall rules in Google Cloud?
ACloud Storage
BCloud Armor
CVPC Network
DCloud Functions
Explanation
VPC Network provides the features for creating firewall rules, while the other options serve different purposes.
Q50
A company needs to ensure that only authorized users can view sensitive data stored in Cloud Storage. What should they use?
ABucket Policies
BIAM Roles
CObject Lifecycle Management
DService Accounts
Explanation
IAM Roles allow fine-grained access control for sensitive data, unlike Bucket Policies which provide overall configurations.