What happens when you enable VPC flow logs for a subnet?
AIncreased bandwidth usage
BTraffic data is logged
CLatency is reduced
DFirewall rules are modified
Explanation
Enabling VPC flow logs captures and logs network traffic data; it does not impact bandwidth or latency.
Q202
Which service is used for DDoS attack protection?
ACloud Armor
BCloud Pub/Sub
CCloud Functions
DBigQuery
Explanation
Cloud Armor provides DDoS protection, while others serve different functions.
Q203
A company needs to audit their IAM roles usage monthly. Which tool should they utilize?
ACloud Compliance
BCloud Audit Logs
CIAM Policy Management
DResource Manager
Explanation
Cloud Audit Logs maintain IAM role usage records.
Q204
You are configuring a firewall rule to allow traffic to a VM. What happens when priorities are equal?
AAllow rule takes priority
BDeny rule takes priority
CNo rule is applied
DPrioritization fails with an error
Explanation
When priorities are equal, deny rules take precedence over allow rules.
Q205
Which service provides real-time security insights?
AGoogle Cloud Security Command Center
BGoogle Cloud Resource Manager
CGoogle Kubernetes Engine
DGoogle App Engine
Explanation
Google Cloud Security Command Center offers security insights while the other services focus on resource management or application deployment.
Q206
A company needs to enable logging for Cloud Functions. What should they configure?
ACloud Logging
BPub/Sub
CCloud Run
DIdentity and Access Management
Explanation
Cloud Logging integrates directly with Cloud Functions, while the other options are unrelated to logging specifically.
Q207
You are configuring IAM policies. What happens if a user belongs to two conflicting roles?
AHigher privilege wins
BLower privilege wins
CNo access granted
DAccess depends on resource type
Explanation
In IAM, roles that grant higher permissions take precedence unless overridden by a deny rule, while the other options do not accurately reflect IAM behavior.
Q208
Which service provides automated threat detection in GCP?
ACloud Security Command Center
BCloud Functions
CCloud Spanner
DCloud Pub/Sub
Explanation
Cloud Security Command Center provides automated threat detection, while the others serve different functions.
Q209
A company needs to securely manage sensitive data across its GCP resources. What is the best approach?
AUse IAM roles only
BImplement VPC Service Controls
CStore data in public buckets
DDisable logging to avoid exposure
Explanation
Implementing VPC Service Controls enhances security for sensitive data management, while the other options expose data risks.
Q210
What happens when you assign the 'roles/logging.logWriter' role to a service account?
ACan read logs only
BCan delete logs
CCan write logs
DCan retrieve log bucket metadata
Explanation
The 'roles/logging.logWriter' role allows writing logs, while the other options do not reflect this role's capabilities.