You are configuring IAM roles for a virtual machine. What happens when you assign roles at the project level?
AOnly the VM has those roles
BAll resources inherit those roles
CRoles are ignored by other services
DRoles apply only to Compute Engine
Explanation
Project-level roles grant permissions to all resources within it, unlike the other options.
Q442
Which Google Cloud service can provide continuous security monitoring?
ACloud Audit Logs
BCloud Security Command Center
CIdentity-Aware Proxy
DData Loss Prevention API
Explanation
Cloud Security Command Center offers real-time visibility for security monitoring, while others focus on specific functions.
Q443
A company needs to secure sensitive information in Cloud Storage. What should they use?
AIAM Policies
BBucket Labels
CObject Versioning
DCustomer-Supplied Encryption Keys
Explanation
Customer-Supplied Encryption Keys provide a means to control encryption, while the others do not secure data directly.
Q444
You are configuring Cloud Pub/Sub. What happens when a message is acknowledged?
AThe message is deleted.
BThe message is re-delivered.
CThe message is archived.
DThe message is sent to a backlog.
Explanation
Acknowledged messages are effectively deleted, while others describe actions after read.
Q445
Which service is best for centralized logging in GCP?
ACloud Logging
BCloud Pub/Sub
CCloud Storage
DFirebase Hosting
Explanation
Cloud Logging aggregates logs from various GCP services, while the others do not specialize in centralized logging.
Q446
A company needs to prevent any external access to their Virtual Private Cloud (VPC). What should they implement?
APublic IP addresses for all instances
BFirewall rules allowing all traffic
CPrivate Google Access
DVPC Service Controls
Explanation
VPC Service Controls restrict data exfiltration, unlike the other options which are less secure.
Q447
You are configuring IAM roles and need a role that allows users to create and manage Cloud Functions but not access their source code. Which role would you choose?
ACloud Functions Admin
BFunctions Developer
CViewer
DCustom IAM Role
Explanation
The Functions Developer role meets the criteria, while the Admin role includes source code access.
Q448
Which service provides real-time threat detection on GCP?
ACloud Security Command Center
BCloud Functions
CCloud Storage
DBigQuery
Explanation
Cloud Security Command Center detects threats actively, while others do not focus on threat detection.
Q449
A company needs to encrypt data at rest across all storage solutions. Which approach is most effective?
AUse tools to encrypt data manually
BEnable default encryption in storage settings
CEncrypt only sensitive files
DUse external encryption services only
Explanation
Enabling default encryption ensures all data is always encrypted, while other options require extra steps or don't provide comprehensive coverage.
Q450
You are configuring access rights for a service account. What happens if the account has 'roles/editor' permission?
ACan read and write all resources
BCan only read resources
CCan only delete resources
DNo permissions granted
Explanation
'roles/editor' permissions allow complete control over resources, unlike the other options, which restrict actions.