A company needs to ensure their VM instances are only accessible from specific IP ranges. What should they implement?
AFirewall rules
BVPC peering
CLoad balancers
DIAM roles
Explanation
Firewall rules specifically control network access based on IPs, while others manage resources or permissions.
Q402
What happens when you enable VPC Flow Logs for a GCP network?
ATraffic is blocked
BTraffic is not logged
CNetwork traffic is logged
DSecurity policies are enforced
Explanation
Enabling VPC Flow Logs logs network traffic information, while the other options inaccurately describe its functionality.
Q403
Which Google Cloud service enables real-time data processing?
ACloud Pub/Sub
BCloud Storage
CCloud SQL
DCloud Functions
Explanation
Cloud Pub/Sub is designed for real-time messaging and data streaming; other options lack this functionality.
Q404
A company needs to enforce user-specific permissions on its Google Cloud resources. Which management technique should it use?
AOrganization Policies
BIAM Roles
CService Accounts
DFirewall Rules
Explanation
IAM Roles allow detailed user-specific access control; other options do not provide granular permission management.
Q405
What happens when you apply a deny rule in Identity-Aware Proxy?
AAccess is granted for all users
BAccess is denied for specified users
CUsers are prompted for MFA
DPolicies are ignored completely
Explanation
Deny rules specifically block access for identified users; other options do not reflect the rule's purpose.
Q406
Which service provides threat detection for GCP resources?
ACloud Security Command Center
BIdentity Access Management
CVPC Service Controls
DCloud Functions
Explanation
Cloud Security Command Center proactively identifies vulnerabilities, while others focus on different aspects of security.
Q407
A company needs to enable logging for all interactions with their Cloud Storage buckets. What should they configure?
AAudit Logging
BStackdriver Monitoring
CCloud Functions
DBigQuery
Explanation
Audit Logging specifically records metadata about operations, while others do not focus on logging interactions.
Q408
What happens when you disable a service account in GCP?
AAll associated IAM roles are revoked
BAccess tokens are still valid
CThe account can still be used
DNo new tokens can be issued
Explanation
Disabling prevents new access tokens from being issued, while other options misrepresent the impact on roles or access.
Q409
What is the primary function of Google Cloud Armor?
ADDoS protection and web defense
BDatabase management solution
CNetwork load balancing
DIdentity management service
Explanation
Google Cloud Armor is designed for DDoS protection and web application defense, while others serve different functions.
Q410
A company needs to securely store sensitive data while enabling controlled access. Which Google Cloud feature should they utilize?
AGoogle Cloud Storage Encryption
BGoogle Cloud Pub/Sub
CFirewall Rules
DCloud Functions
Explanation
Google Cloud Storage Encryption provides security for data at rest and access control, while other options do not specifically relate to secure data storage.