What happens when a user is granted the 'roles/storage.objectViewer' role on a Cloud Storage bucket?
ACan delete objects in the bucket
BCan view objects but not edit
CCan upload files to the bucket
DCan change bucket settings
Explanation
'roles/storage.objectViewer' allows viewing but not editing or modifying, while others indicate incorrect permissions.
Q412
Which service provides DDoS protection in GCP?
ACloud Armor
BCloud Storage
CStackdriver Monitoring
DCloud Functions
Explanation
Cloud Armor protects applications from DDoS attacks, while other options do not provide DDoS protection.
Q413
A company needs to audit IAM permissions. What should they use?
AIAM Policy Simulator
BGCP Logging
CCloud Shell
DStackdriver Trace
Explanation
The IAM Policy Simulator helps audit permissions effectively, while the others serve different purposes.
Q414
What happens when you disable a Google Cloud project?
AAll resources are deleted immediately
BBilling is suspended but data remains
CResources still operate normally
DService accounts are deleted automatically
Explanation
Disabling a project suspends billing but retains data; others misinterpret project disabling effects.
Q415
You are configuring IAM policies for a GCP project. What happens if you grant the 'roles/viewer' role to a user?
AUser can only view resources.
BUser can modify resources.
CUser can deploy new services.
DUser can delete existing resources.
Explanation
'roles/viewer' allows users to view resources, but not modify or delete them; other options grant incorrect permissions.
Q416
A company needs to maintain sensitive data integrity in Google Cloud. Which service is best for data encryption at rest?
AGoogle BigQuery
BCloud Key Management
CCloud Storage
DCloud Pub/Sub
Explanation
Cloud Key Management facilitates managing encryption keys for secured data, while others focus on data handling, not encryption.
Q417
What is a consequence of configuring a Google Cloud VPC with Shared VPC using an unauthorized subnet?
ATraffic will be automatically routed.
BUsers will lose all network access.
CResources cannot communicate properly.
DShared VPC will function normally.
Explanation
Using an unauthorized subnet leads to incorrect routing, hindering resource communication; options A and D misrepresent functionality, while B overstates impact.
Q418
Which service helps manage secrets in Google Cloud?
ASecret Manager
BCloud Storage
CCloud SQL
DData Loss Prevention
Explanation
Secret Manager securely stores and manages sensitive information, unlike the other options which serve different purposes.
Q419
A company needs to enforce IAM policies for multiple projects efficiently. What should they use?
AResource Manager
BService Accounts
COrg Policies
DCloud Functions
Explanation
Org Policies enable consistent IAM policy enforcement across projects, while the others do not fulfill this requirement.
Q420
You are configuring VPC firewall rules. What happens when you assign a rule with a priority number that is lower than an existing rule?
AThe new rule is ignored
BThe new rule supersedes the existing
CBoth rules are effective simultaneously
DThe new rule will never activate
Explanation
Firewall rules are processed in order of priority, so a lower number rule takes precedence over higher number rules.