A company needs to monitor its cloud functions for anomalies. Which GCP service should they use?
ACloud Functions
BCloud Monitoring
CCloud Spanner
DCompute Engine
Explanation
Cloud Monitoring provides visibility into GCP services, unlike the others.
Q192
You are configuring logging for your GCP project. What happens when you set log retention to 0 days?
ALogs are never retained
BLogs can be accessed monthly
CLogs are retained for 30 days
DLogs are archived indefinitely
Explanation
Setting retention to 0 days means logs won't be kept.
Q193
Which service provides security policies for GCP resources?
ACloud IAM
BCloud Functions
CCloud Pub/Sub
DCloud Storage
Explanation
Cloud IAM manages access policies, while others are service-specific.
Q194
A company needs to ensure data at rest is encrypted in Cloud Storage. What should they consider?
AOnly use public access buckets
BUse encryption keys managed externally
CEnable Object Versioning
DUtilize Google-managed encryption keys
Explanation
Google-managed keys provide automatic encryption without user management.
Q195
You are configuring audit logging for your Google Cloud projects. What happens when you turn on Data Access audit logs?
ALogs only admin actions
BLogs read and write operations
CLogs exclude Cloud Functions
DLogs only errors and warnings
Explanation
Data Access logs include all read and write operations, unlike admin logs which track access changes.
Q196
Which service provides auditing capabilities for Google Cloud resources?
AGoogle Cloud Audit Logs
BGoogle Cloud Storage
CGoogle Cloud Functions
DGoogle Compute Engine
Explanation
Google Cloud Audit Logs tracks and logs all administrative actions and resource access, while the others do not specifically focus on auditing.
Q197
A company needs to ensure only specific users can access sensitive data in Cloud Storage. What should they configure?
ABucket policies
BFirewall rules
CIAM roles
DLoad balancer
Explanation
IAM roles directly control user access rights, while the others do not regulate access to sensitive data.
Q198
What happens when a Compute Engine instance reaches its CPU quota limit?
AInstance automatically terminates
BInstance becomes read-only
CNew instances cannot be created
DExisting instances will be paused
Explanation
Reaching the CPU quota prevents the creation of new instances, while existing instances remain unaffected unless manually stopped or terminated.
Q199
Which Google Cloud service exclusively manages SSL certificates?
AGoogle Cloud SSL Manager
BGoogle Cloud Load Balancing
CGoogle Cloud Storage
DGoogle Cloud Certificate Manager
Explanation
Google Cloud Certificate Manager is specifically designed for SSL certificate management; the other options do not provide this service.
Q200
A company needs to restrict SSH access to only certain IP addresses. What is the most efficient way to implement this?
AUse IAM roles
BConfigure firewall rules
CSet up a VPN
DEnable OS-level restrictions
Explanation
Configuring firewall rules is the most efficient method to restrict SSH access by IP; IAM roles do not control network access.