Which service provides security command center features?
ACloud Security Command Center
BCloud Identity
CCloud Armor
DCloud Audit Logs
Explanation
Cloud Security Command Center enables comprehensive visibility of security assets, making it the right choice.
Q92
A company needs to ensure compliance for GCP environments. Which service should they use?
AGCP Policy Intelligence
BCloud Asset Inventory
CCloud Security Scanner
DCloud Compliance Center
Explanation
Cloud Asset Inventory provides visibility to manage compliance effectively across GCP services.
Q93
You are configuring audit logging for sensitive GCP services. What happens when you set logging to 'Data Access'?
ALogs all system events only
BLogs access to sensitive data only
CLogs both admin and access events
DNo logging occurs
Explanation
'Data Access' logging captures both Admin activity and access to resources for comprehensive monitoring.
Q94
Which Google Cloud service provides malware scanning for Cloud Storage?
ACloud Security Command Center
BCloud Storage
CPub/Sub
DCloud Functions
Explanation
Cloud Security Command Center offers malware scanning; other options do not provide this feature.
Q95
A company needs to secure sensitive data at rest in Google Cloud. Which encryption strategy should they implement?
AClient-Side Encryption
BStandard Encryption
CPublic Encryption
DData Loss Prevention
Explanation
Client-Side Encryption protects data before it reaches the cloud; others do not ensure this level of security.
Q96
What happens when a virtual machine's firewall rules allow all traffic?
AImproved performance for the VM
BIncreased risk of attacks
CNo external connectivity
DEnhanced data encryption
Explanation
Allowing all traffic significantly raises the attack risk; others don't accurately reflect the implications of this configuration.
Q97
Which Google Cloud service is primarily used for identifying and mitigating DDoS attacks?
ACloud Armor
BCloud CDN
CStackdriver Monitoring
DCloud Pub/Sub
Explanation
Cloud Armor provides security against DDoS attacks, while others do not address DDoS specifically.
Q98
A company needs to ensure that their Google Cloud VMs restart in a different zone if the current zone experiences an outage. What should they implement?
APreemptible VMs
BRegional Managed Instance Groups
CStandard Instances
DSnapshots
Explanation
Regional Managed Instance Groups can automatically restart VMs in a different zone; the other options do not provide this feature.
Q99
You are configuring IAM roles and notice direct permissions are greater than the inherited permissions. What happens when a user has both?
AInherited permissions override direct
BDirect permissions override inherited
CNeither permission applies
DPermissions cannot be combined
Explanation
Direct permissions have higher precedence than inherited ones, while the others incorrect about permission behavior.
Q100
Which Google Cloud service provides identity management for your applications?
ACloud Identity
BCompute Engine
CBigQuery
DCloud Pub/Sub
Explanation
Cloud Identity offers identity management, whereas others provide different functionalities.