You are configuring a Google Kubernetes Engine (GKE) cluster's security. What is the outcome of enabling private nodes?
ANodes lose internet access
BNodes require public IPs
CMore security in cluster
DNodes have higher latency
Explanation
Enabling private nodes restricts direct internet access for security, while others are incorrect outcomes.
Q292
Which service provides SIEM capabilities in GCP?
ACloud Logging
BCloud Security Command Center
CData Loss Prevention
DVPC Network Peering
Explanation
Cloud Security Command Center offers SIEM capabilities, while others focus on logging, data protection, or networking.
Q293
A company needs to restrict API access based on user attributes. Which GCP feature should they use?
APub/Sub
BIAM Conditions
CFirewall Rules
DVPC Service Controls
Explanation
IAM Conditions allow attribute-based access, while others do not provide this capability.
Q294
You are configuring access for a GCP project. What happens when you set a role at the organization level?
AApplies to all organizations.
BOverrides project-level permissions.
COnly applies to selected users.
DNo effect on projects.
Explanation
An organization-level role overrides all project-level permissions for that role.
Q295
Which service helps in managing user identities and access?
ACloud Identity
BCompute Engine
CCloud Functions
DBigQuery
Explanation
Cloud Identity specializes in user management; others do not.
Q296
A company needs to ensure its data stored in Cloud Storage is encrypted at rest. What should it configure?
AEnable default encryption
BDisable all access
CUse public cloud storage
DArchive the data
Explanation
Enabling default encryption ensures data at rest is secured; the other options do not address encryption.
Q297
What happens when a firewall rule is set to allow all traffic on a VM's network interface?
AOnly inbound traffic is allowed
BAll traffic is allowed
COnly outbound traffic is allowed
DTraffic is blocked by default
Explanation
Allowing all traffic on the interface permits both inbound and outbound traffic; other options are incorrect interpretations of firewall behavior.
Q298
Which service provides automated threat detection in GCP?
ASecurity Command Center
BCloud Functions
CBigQuery
DCompute Engine
Explanation
Security Command Center is designed for threat detection, while the other options serve different purposes.
Q299
A company needs to implement fine-grained access control on its Cloud Storage buckets. What should it use?
AIAM permissions only
BAccess Control Lists (ACLs)
CVPC Service Controls
DCloud Audit Logs
Explanation
Access Control Lists (ACLs) allow for fine-grained access, while IAM permissions manage broader roles.
Q300
You are configuring Trusted Types for your web applications running in App Engine. What happens when a user submits unsafe JavaScript code through a form?
AThe code is executed.
BThe code is only sanitized.
CAn error is thrown.
DThe code is blocked.
Explanation
Trusted Types prevent the execution of unsafe code, while the other options imply unsafe behavior.