Explanation
Google Cloud Armor offers DDoS protection, while others do not specialize in this area.
Q392
A company needs to detect anomalies in user behavior quickly. Which GCP service should they use?
ACloud Logging
BCloud Security Command Center
CBigQuery ML
DCloud Monitoring
Explanation
Cloud Security Command Center can analyze security patterns, unlike the other services that focus on different aspects.
Q393
What happens when you assign multiple IAM roles to a single user?
AUser can exceed permissions
BUser shares permissions among roles
CUser gets highest priority role
DUser combines all permissions
Explanation
When multiple IAM roles are assigned, the user combines all granted permissions from the roles.
Q394
Which service provides automated DDoS attack mitigation?
ACloud Armor
BCloud CDN
CCloud Functions
DCloud Pub/Sub
Explanation
Cloud Armor is specifically designed to mitigate DDoS attacks, while other services do not focus on DDoS protection.
Q395
A company needs to monitor and respond to security alerts in real time. What should they use?
ACloud Functions
BCloud Monitoring
CChronicle
DCloud Logging
Explanation
Chronicle is designed for security event analysis and response, unlike the other options which serve different purposes.
Q396
You are configuring Identity and Access Management for multiple projects. What is a recommended practice?
AUse project-level permissions for all users
BImplement IAM policies at the organization level
CAssign roles primarily at the folder level
DDisable IAM for sensitive projects
Explanation
Implementing IAM policies at the organization level streamlines access management across projects, whereas other options either limit accessibility or are insecure.
Q397
Which Google Cloud service provides a managed Kubernetes environment?
AGoogle Kubernetes Engine
BGoogle Compute Engine
CApp Engine
DCloud Functions
Explanation
Google Kubernetes Engine (GKE) manages Kubernetes clusters; other options do not target Kubernetes specifically.
Q398
A company needs to ensure that only specific users have access to certain APIs in a project. What should they implement?
AIAM roles and permissions
BVPC Service Controls
CSecret Manager
DCloud IAM Policies
Explanation
IAM roles and permissions manage user access; VPC Service Controls are for data privacy, not specific user APIs.
Q399
You are configuring a Google Cloud Function to handle 100 concurrent requests. What happens if a 101st request comes in?
ARequest fails immediately
BThe request is queued
CNew instance launches automatically
DRequests time out immediately
Explanation
Cloud Functions autoscale to handle additional requests beyond the limit by launching new instances; others describe incorrect behavior.
Q400
Which service helps monitor and enforce security policies in GCP?
AGoogle Cloud Armor
BCloud Security Scanner
CSecurity Command Center
DData Loss Prevention
Explanation
Security Command Center provides insights into security posture while the others focus on specific aspects.