A company needs to securely manage user permissions across multiple Google Cloud projects. Which service should they implement?
ACloud IAM
BCloud Security Scanner
CGoogle Cloud Source Repositories
DStackdriver Monitoring
Explanation
Cloud IAM allows centralized permission management across projects.
Q72
What happens when an IAM role is assigned to a service account that also has a denial policy?
AAccess is granted by the role
BAccess is denied by the policy
CAccess is denied unless explicitly allowed
DAccess is granted under all circumstances
Explanation
IAM policies follow a principle of least privilege; denial policies take precedence unless otherwise allowed.
Q73
Which Google Cloud service is best suited for assessing security compliance?
ASecurity Health Analytics
BCloud Monitoring
CCloud Run
DBigQuery
Explanation
Security Health Analytics evaluates compliance against industry standards; the other options provide different monitoring and data services.
Q74
A company needs to securely share a Google Cloud Storage bucket with external partners while maintaining tight control over access. What is the best approach?
APublic access to the bucket
BIAM roles for user access
CShared VPC configuration
DCloud Pub/Sub for messaging
Explanation
IAM roles allow granular control over who can access the bucket; public access and other options do not provide sufficient security.
Q75
You are configuring Google Cloud’s VPC with an emphasis on security. What happens when you enable VPC Service Controls?
AIncreased bandwidth for all connections
BEnhanced isolation for services
CPublic accessibility to all resources
DAutomatic backup of all resources
Explanation
VPC Service Controls enhance isolation for specified services, while other options do not pertain to security posture.
Q76
Which service provides unified security management for Google Cloud?
ACloud Security Command Center
BCloud Identity
CCloud Armor
DCloud Data Loss Prevention
Explanation
Cloud Security Command Center provides comprehensive security insights, whereas the others focus on specific aspects.
Q77
A company needs to restrict access to its Cloud Storage buckets to specific IP ranges. Which service should they use?
AIAM Roles
BVPC Service Controls
CService Accounts
DCloud Functions
Explanation
VPC Service Controls enhance security around resources by using specific IP restrictions, unlike IAM or Service Accounts.
Q78
You are configuring Google Cloud Armor to protect your application. What happens when you apply a security rule that denies traffic from a specific country?
AConnection attempts are logged.
BTraffic from that country is blocked.
CTraffic is only monitored.
DAccess is granted with logging enabled.
Explanation
Applying a deny rule explicitly blocks traffic from the specified country, while the other options do not prevent access.
Q79
Which service can enforce organization policies across projects?
AOrganization Policy Service
BCloud Identity
CResource Manager
DCloud Security Command Center
Explanation
The Organization Policy Service allows centralized policy enforcement across projects, while others focus on identity or security specific functions.
Q80
A company needs to ensure that sensitive data is encrypted at rest without modifying application code. Which Google Cloud service should they use?
ACustomer Managed Encryption Keys
BGoogle Cloud Armor
CCloud KMS
DCloud Storage Security
Explanation
Customer Managed Encryption Keys allow encryption at rest without code changes, while the others relate to different security needs.