Which service is best for monitoring Google Cloud resources?
ACloud Monitoring
BCloud Storage
CCloud SQL
DCloud Functions
Explanation
Cloud Monitoring provides insights on resource performance, while others focus on storage or data processing.
Q422
A company needs to restrict access to its BigQuery datasets based on user attributes. Which Google Cloud service should they use?
AIAM
BCloud Functions
CDLP
DVPC
Explanation
IAM policies can enforce fine-grained access control based on attributes, unlike the other options.
Q423
What happens when you set a Cloud Firewall Rule to deny all traffic?
AAllow all traffic except specified
BAllow no traffic at all
COnly block internal traffic
DApply to all service accounts
Explanation
Denying all traffic blocks all incoming and outgoing requests, not just specific ones.
Q424
Which Google Cloud service is best for security identity management?
AIdentity and Access Management (IAM)
BCloud Storage
CCompute Engine
DBigQuery
Explanation
IAM is specifically designed for identity management, while others serve different purposes.
Q425
A company needs to limit network traffic to its instance. What should they implement?
AFirewall rules
BLoad balancers
CVPN connections
DCloud CDN
Explanation
Firewall rules control inbound and outbound traffic; others do not provide this specific functionality.
Q426
You are configuring audit logs for a GCP project. What happens when you set logs to a lower severity?
AIrrelevant logs are omitted
BMore detailed logs are captured
CLess detailed logs are stored
DAll logs are collected regardless
Explanation
Lower severity means capturing lesser details; higher severity would increase detail, not decrease.
Q427
Which service is used for managing encryption keys on Google Cloud?
ACloud Key Management Service
BCloud Storage
CCloud Pub/Sub
DCloud Audit Logs
Explanation
Cloud Key Management Service securely manages encryption keys, while others serve different functions.
Q428
A company needs to ensure only specific users can access sensitive Cloud Firestore documents. What should they implement?
AIAM Roles
BFirestore Security Rules
CVPC Service Controls
DPrivate Service Connect
Explanation
Firestore Security Rules are designed for document-level access control, unlike IAM, VPC, or Private Service Connect which serve different purposes.
Q429
You are configuring VPC Service Controls for a project. What happens if you create a perimeter but don't include a service in it?
ATraffic is fully restricted for that service
BService is limited to audit logging
CService is unrestricted for all projects
DTraffic is allowed if it's internal
Explanation
Services not in the perimeter remain unrestricted, contrary to the restrictions of perimeter services.
Q430
Which service provides centralized configuration management for Google Cloud resources?
AGoogle Cloud Config
BGoogle Cloud Lifecycle Policy
CGoogle Cloud Asset Inventory
DGoogle Configuration Management
Explanation
Google Cloud Asset Inventory allows centralized management of configurations, while the others do not serve this function.