A company needs to ensure its virtual machines are not accessible from the internet but still allows access to specific external services. What configuration should they implement?
APublic IP for each VM
BUse Private Google Access
CEnable firewall rules for SSH access
DSet default route to None
Explanation
Private Google Access allows VMs without public IPs to access Google services without opening them to the internet, while the other options expose or misconfigure access.
Q342
What happens when you set a GCP GCS bucket's uniform access control to ‘fine-grained’?
AIt disables object-level permissions
BIt enables only owner access
CIt allows both object and bucket permissions
DIt restricts public access
Explanation
Setting to fine-grained keeps both object and bucket permissions separated, while the other options misinterpret access rules.
Q343
Which service allows threat detection for GCP resources?
AGoogle Cloud Security Command Center
BCloud Audit Logs
CCloud Identity-Aware Proxy
DGoogle Cloud Armor
Explanation
Google Cloud Security Command Center provides security insights, while others focus on access control or protection against DDoS attacks.
Q344
A company needs to restrict IAM roles to specific time frames. Which feature should they use?
AService Accounts
BCustom IAM Roles
CIAM Conditions
DFederated Identities
Explanation
IAM Conditions allow role restrictions based on specific attributes, while other options do not provide time-based access controls.
Q345
You are configuring a VPC with multiple subnets. What happens if you do not specify the subnet range?
ANetwork is created successfully.
BDefault range is assigned.
CCreation fails with error.
DIt applies IPv4 automatically.
Explanation
Failing to specify a range leads to a creation error, as subnets require defined IP ranges.
Q346
Which Google Cloud service is used for managing APIs?
ACloud Endpoints
BCloud Functions
CCloud Run
DCloud Storage
Explanation
Cloud Endpoints is specifically designed for API management, whereas the other options serve different purposes.
Q347
A company needs to secure their virtual machines. What should be their first step?
AApply IAM roles
BConfigure firewall rules
CDisable SSH access
DInstall antivirus software
Explanation
Configuring firewall rules is a fundamental step in securing VMs, while the other options are either secondary or specific to lesser security measures.
Q348
What happens when you apply a security policy to a Google Cloud organization?
AIt applies to all projects
BIt can be overridden by projects
CIt restricts all users automatically
DIt affects only the organization's resources
Explanation
Applying a security policy to an organization will enforce it across all projects within that organization, unlike the other options that describe incorrect hierarchical rules.
Q349
Which service provides real-time threat detection for Google Cloud?
ACloud Insight
BCloud Security Command Center
CCloud Monitoring
DCloud Logging
Explanation
Cloud Security Command Center helps identify threats, while others focus on different functionalities.
Q350
A company needs to ensure that employees only access the data necessary for their specific role. Which Google Cloud feature should they implement?
AIAM Policies
BService Accounts
CFirewall Rules
DCloud Functions
Explanation
IAM Policies manage access based on roles, unlike the other options which serve different functions.