Which Google Cloud service provides threat detection and response?
ACloud Security Command Center
BCloud Logging
CCloud Storage
DCompute Engine
Explanation
Cloud Security Command Center specifically detects threats; the others provide different functionalities.
Q122
A company needs to manage permissions across multiple GCP projects for compliance. What should they use?
AOrganization Policies
BIAM Roles
CVPC Peering
DCloud Functions
Explanation
Organization Policies can enforce compliance policies across projects; IAM roles are project-specific.
Q123
When configuring a Google Kubernetes Engine (GKE), what happens if you use default network policies?
ANo traffic is allowed
BAll traffic is allowed
COnly pod-to-pod traffic allowed
DIngress from internet is blocked
Explanation
Default network policies allow all traffic; restrictive policies must be defined explicitly.
Q124
Which service helps to protect applications against DDoS attacks?
AGoogle Cloud Armor
BCloud Identity
CVPC Service Controls
DData Loss Prevention
Explanation
Google Cloud Armor provides DDoS protection while the others serve different purposes.
Q125
A company needs to manage access to its GCP resources efficiently. What should they use?
AService accounts
BIAM roles and policies
CInstance templates
DDNS settings
Explanation
IAM roles and policies enable fine-grained access control, while service accounts are used for specific applications.
Q126
What happens when you remove a user from a Google Cloud IAM role?
AUser loses access immediately
BUser retains access for 30 days
CRole is deleted permanently
DUser is notified via email
Explanation
Removing a user from a role revokes access immediately; the other options are incorrect.
Q127
Which service is best for managing API keys securely?
AGoogle Cloud Secret Manager
BGoogle Cloud Functions
CGoogle Cloud Storage
DGoogle Cloud Pub/Sub
Explanation
Google Cloud Secret Manager securely stores sensitive data like API keys; the others are not designed for secure storage of secrets.
Q128
A company needs to implement VPC for security purposes. What should they consider first?
ADefault routing configurations
BFirewall rules for the VPC
CIP address ranges to use
DSubnetwork names
Explanation
Selecting appropriate IP address ranges is crucial as it defines the VPC boundaries; other options are important but come after IPC planning.
Q129
What happens when a Cloud IAM policy is misconfigured?
AAccess is granted to everyone
BAccess is denied for all roles
COnly specific users are affected
DAuditing is disabled
Explanation
A misconfigured IAM policy could inadvertently open access broadly unless constraints are specified; others do not accurately describe misconfiguration effects.
Q130
Which service can help in analyzing security logs from Google Cloud?
ACloud Audit Logs
BCloud Storage
CCloud Functions
DCloud Pub/Sub
Explanation
Cloud Audit Logs specifically track access and security events, while the others serve different purposes.