What happens when you set a firewall rule to allow ingress traffic from '0.0.0.0/0' in GCP?
AAllow all incoming traffic
BBlock all incoming traffic
CAllow only specific IP traffic
DRequire authenticated access
Explanation
'0.0.0.0/0' permits all incoming connections; others contradict it.
Q172
Which service helps automate incident response workflows?
ACloud Functions
BCloud Run
CCloud Task
DSecurity Command Center
Explanation
Cloud Functions can automate workflows through triggered responses, while others focus on service deployment or security monitoring.
Q173
A company needs to monitor the security of all its GCP resources. What is the best tool to use?
AGoogle Kubernetes Engine
BCloud Security Analyzer
CCloud Identity
DCloud Logging
Explanation
Cloud Security Analyzer specifically addresses resource security monitoring, while the others do not focus comprehensively on security.
Q174
What happens when a Google Cloud VM instance’s firewall rules are misconfigured?
AVM becomes unreachable remotely
BVM automatically shuts down
CVM incurs additional costs
DVM data gets deleted
Explanation
Misconfigured firewall rules can prevent remote access without affecting the VM's operation or data directly.
Q175
Which service can be used for DDoS protection in Google Cloud?
ACloud Armor
BCloud Security Scanner
CIdentity-Aware Proxy
DVPC Peering
Explanation
Cloud Armor provides DDoS defense, while others focus on different security aspects.
Q176
A company needs to restrict access to a Cloud Storage bucket to a specific IP range. What should they implement?
AService Accounts
BIAM roles
CSigned URLs
DBucket Policy
Explanation
Bucket Policies can specify access conditions such as IP ranges, unlike the others.
Q177
You are configuring a secure VPN connection to Google Cloud. What might happen if you choose to use open-source VPN software?
ANo security issues
BVendor support available
CPossible configuration vulnerabilities
DIncreased latency
Explanation
Open source software may have security vulnerabilities if misconfigured, unlike vendor-supported solutions.
Q178
Which service enables automated security monitoring and management?
ACloud Security Command Center
BCloud Spanner
CCloud Run
DCloud Functions
Explanation
Cloud Security Command Center provides comprehensive security insights, while the others are compute services not focused on security monitoring.
Q179
A company needs to control access to a cloud resource based on the device being used. What should they implement?
AVPC Service Controls
BIAM Conditions
CService Account Roles
DResource Policies
Explanation
IAM Conditions allow fine-grained access control based on device attributes, while the others do not focus on device-based policies.
Q180
You are configuring a firewall rule in GCP. What happens when you select 'allow' in the default action?
AAll traffic is blocked
BOnly specific traffic is allowed
CAll traffic is allowed
DNo traffic filtering occurs
Explanation
Selecting 'allow' in a firewall allows all matching traffic, while the others describe incorrect behaviors for firewall actions.