What happens when you set a bucket's Uniform bucket-level access in Cloud Storage?
AAccess is denied to all objects
BPermission is set for individual objects
CPermissions are based on IAM roles only
DBucket permissions override object permissions
Explanation
Uniform bucket-level access requires IAM roles for all permissions, while the other options are incorrect interpretations.
Q22
Which service provides centralized logging and monitoring in GCP?
ACloud Logging
BCloud Storage
CCloud Firewall
DCloud Functions
Explanation
Cloud Logging is designed for centralized logging, while others serve different purposes.
Q23
A company needs to ensure that its Cloud Function is invoked only by an authorized service account. What configuration must they implement?
AAllow all users access
BSet IAM roles for the function
CUse public internet endpoints
DEnable VPC Service Controls
Explanation
Setting IAM roles restricts access to service accounts only, while the other options do not provide this restriction.
Q24
What happens when a GCP project is deleted at the organizational level?
AAll resources are permanently deleted
BResources are archived for 30 days
CPermissions remain active
DBilling stops immediately
Explanation
When a project is deleted, all resources are lost unless backed up, whereas other options imply incorrect states of resources or permissions.
Q25
Which Google Cloud service provides DDoS protection?
ACloud Armor
BCloud Functions
CCloud Pub/Sub
DCloud Bigtable
Explanation
Cloud Armor provides DDoS protection features, while the others do not primarily focus on security against such attacks.
Q26
A company needs to analyze logs in real-time for security incidents. What should they use?
ACloud Storage
BBigQuery
CDataflow
DCloud Logging
Explanation
Dataflow is optimal for real-time log analysis, while others are not designed specifically for real-time streaming processing.
Q27
You are configuring IAM roles for a project. What happens if a user has both a higher and a lower-level role?
AHigher role prevails
BLower role prevails
CConflicts cause access denial
DBoth roles are additive
Explanation
In IAM, a higher role prevails over a lower role; lower roles do not negate permissions granted by higher roles.
Q28
Which service provides detection and investigation of security incidents?
ACloud Security Command Center
BGoogle Cloud Load Balancer
CCloud Resource Manager
DBigQuery ML
Explanation
Cloud Security Command Center enables security incident detection and investigation, unlike the others.
Q29
A company needs to log access to sensitive data stored in Cloud Storage. What should they enable?
AVPC Service Controls
BCloud Audit Logs
CCloud Armor
DGenomics API
Explanation
Cloud Audit Logs are specifically for logging access events.
Q30
You are configuring IAM policies for diverse teams in your organization. What should be avoided when assigning permissions?
AUsing least privilege principle
BOver-privileging users
CUtilizing predefined roles
DRegularly reviewing policies
Explanation
Over-privileging users contradicts security best practices.