You are configuring IAM roles. What happens when a user has both admin and viewer roles on the same resource?
AAdmin role takes precedence
BViewer role is ignored
CNo permissions granted
DOnly viewer permissions apply
Explanation
The Admin role provides broader access and takes precedence over Viewer permissions, making the user fully authorized.
Q82
Which service provides Google Cloud's identity management?
ACloud Identity
BCloud Run
CCloud Functions
DCloud Pub/Sub
Explanation
Cloud Identity manages user identities, while the others serve different purposes.
Q83
A company needs to ensure that only specific IP ranges can access its Cloud Storage buckets. What should it implement?
ABucket policies
BAccess Control Lists
CFirewall rules
DVPC Service Controls
Explanation
Firewall rules control traffic from IP ranges, while the others do not restrict at the IP level.
Q84
What happens when you generate a new service account key in Google Cloud?
AThe old key is deleted.
BA new unique key is created.
CThe service account is disabled.
DPermissions are reset automatically.
Explanation
A new unique key is added, and previous keys remain active unless manually revoked.
Q85
Which service provides identity and access management in GCP?
AGoogle IAM
BGoogle Cloud Storage
CGoogle VPC
DGoogle Compute Engine
Explanation
Google IAM manages user identities and permissions; the others do not focus on access management.
Q86
A company needs to encrypt sensitive data at rest in GCP. Which service should they use?
AGoogle Cloud Key Management
BGoogle Cloud Pub/Sub
CGoogle Cloud Functions
DGoogle Cloud SQL
Explanation
Google Cloud Key Management provides encryption tools; the others do not specifically address encryption at rest.
Q87
What happens when you enable Organization Policy constraints in GCP?
AIt overrides all IAM permissions
BIt restricts resource access based on policies
CIt deletes existing resources automatically
DIt disables all user accounts
Explanation
Enabling Organization Policy constraints restricts access to resources by defined policies; the other options misrepresent the consequences of these constraints.
Q88
Which service can be used to manage security policies for Google Cloud resources?
ACloud Security Command Center
BCloud Functions
CFirestore
DCloud Pub/Sub
Explanation
Cloud Security Command Center provides security insights; the other options do not focus on security management.
Q89
You are configuring IAM roles for a data science team. What should you avoid while granting permissions?
ALeast privilege principle
BOver-provisioned access
CCustom roles based on needs
DRole bindings at the organization level
Explanation
Over-provisioned access violates security best practices, unlike the other options.
Q90
What happens when you delete a Google Cloud Storage bucket that contains objects?
AObjects are moved to Trash
BObjects are lost permanently
CObjects become archived
DDeletion is reversible with a backup
Explanation
Deleting the bucket permanently removes all contained objects; the other options imply a recoverable state that does not exist.