Which Google Cloud service is best for real-time data processing?
ACloud Dataflow
BCloud Storage
CCloud Pub/Sub
DCloud Functions
Explanation
Cloud Dataflow is designed specifically for real-time data processing, unlike the others which serve different purposes.
Q212
A company needs to secure sensitive data in Cloud Storage; which method is most effective?
AUse IAM roles only
BEnable bucket versioning
CUse customer-managed encryption keys
DSet public access prevention
Explanation
Customer-managed encryption keys offer robust control over data encryption, while others emphasize accessibility or versioning rather than security.
Q213
What happens when you use a service account without proper IAM permissions?
AAccess is allowed by default
BAccess is denied
CLimited access to some resources
DAccess logs are not generated
Explanation
Without appropriate IAM permissions, service account access will be denied, protecting resources from unauthorized usage.
Q214
Which service can help monitor and respond to security events in Google Cloud?
ACloud Audit Logs
BCloud Armor
CCloud Operations Suite
DCloud Run
Explanation
Cloud Operations Suite provides monitoring and incident response while others offer logging or protection features.
Q215
A company needs to restrict user access to specific Google Cloud resources based on IAM roles. Which feature should they use?
AVPC Peering
BService Accounts
CIAM Policies
DLoad Balancing
Explanation
IAM Policies are designed for access control, unlike the other options.
Q216
What happens when a Firewall Rule is applied to a Google Cloud project?
AIt affects all regions only.
BIt applies to that specific project only.
CIt goes into effect after a week.
DIt requires user reboot.
Explanation
Firewall Rules are project-specific, affecting only resources within that project, unlike the other options which are incorrect.
Q217
Which service can be used for real-time threat detection in Google Cloud?
ACloud Audit Logs
BCloud Security Command Center
CBigQuery
DCloud NAT
Explanation
Cloud Security Command Center provides real-time threat detection, while the other options serve different purposes.
Q218
A company needs to log activities of IAM users in Google Cloud. What service should they use?
ACloud Pub/Sub
BCloud Logging
CCloud Functions
DCloud Run
Explanation
Cloud Logging captures IAM user activities, while the others are for different functionalities.
Q219
You are configuring security for a Compute Engine instance. What happens when you disable the instance's firewall?
ANo access to the instance
BAll access is blocked
CAll traffic is allowed
DOnly SSH is allowed
Explanation
Disabling the firewall allows all incoming and outgoing traffic, unlike the other options.
Q220
Which service allows you to manage Secrets on GCP?
ACloud Secrets Manager
BCloud Key Management Service
CCloud Functions
DCloud Storage
Explanation
Cloud Secrets Manager securely manages secrets, unlike other options which serve different purposes.