A company needs to securely manage service account keys. What Google Cloud feature should it use?
ACloud IAM
BSecret Manager
CCloud Audit Logs
DVPC Service Controls
Explanation
Secret Manager is designed for managing sensitive configuration data like service account keys, while others are not oriented towards key management.
Q312
What happens when you set a firewall rule to allow ingress traffic on port 80?
AAll incoming traffic is blocked
BOnly HTTPS is allowed
CHTTP traffic is allowed
DNo impact on existing rules
Explanation
Setting the rule specifically allows HTTP traffic on port 80, while the other options are incorrect interpretations of firewall behavior.
Q313
Which service provides DDoS protection in Google Cloud?
ACloud Armor
BCloud CDN
CGoogle Cloud Functions
DCloud Storage
Explanation
Cloud Armor specifically helps mitigate DDoS attacks, while the others serve different purposes.
Q314
A company needs to monitor logins and access attempts. Which tool should they utilize?
ACloud Logging
BCloud Monitoring
CCloud Identity
DCloud Audit Logs
Explanation
Cloud Audit Logs record logins and access attempts; the others focus on different monitoring aspects.
Q315
You are configuring IAM roles for a project. What happens if a user has both 'Editor' and 'Viewer' roles?
AOnly 'Editor' permissions apply
BNo permissions apply
CBoth roles are considered equally
D'Viewer' privileges are ignored
Explanation
IAM roles combine permissions, so 'Editor' overrides 'Viewer' permissions.
Q316
Which GCP service is best for DDoS protection?
AGoogle Cloud Armor
BCloud CDN
CIdentity-Aware Proxy
DBigQuery
Explanation
Google Cloud Armor provides DDoS protection; others do not.
Q317
You are configuring IAM roles for a project. A user needs to read Cloud Storage objects. Which role should you assign?
AStorage Object Admin
BStorage Object Viewer
CProject Editor
DViewer
Explanation
The Storage Object Viewer role allows read access; others grant more permissions.
Q318
What happens when you delete a GCP service account?
AAll attached resources are deleted
BService account keys become invalid
CProject access remains unchanged
DAudit logs are permanently lost
Explanation
Deleting a service account invalidates its keys; others are incorrect consequences.
Q319
Which service is ideal for analyzing security log data in real-time?
AGoogle Cloud Pub/Sub
BGoogle Cloud Logging
CGoogle Cloud Dataflow
DGoogle Cloud Armor
Explanation
Google Cloud Logging collects and analyzes logs, unlike the others which serve different functions.
Q320
A company needs to manage sensitive data while ensuring compliance with regulations. What Google Cloud feature should they use?
AIAM Roles
BVPC Peering
CCloud KMS
DCloud Functions
Explanation
Cloud KMS enables secure key management necessary for compliant sensitive data handling.