A company needs to restrict access to a BigQuery dataset based on user attributes. Which feature should they implement?
ADML Statements
BAttribute-Based Access Control (ABAC)
CService Accounts
DVPC Service Controls
Explanation
Attribute-Based Access Control allows access restrictions based on user attributes, unlike the others.
Q462
You are configuring a firewall rule that denies traffic from specific IP addresses. What happens when this rule is applied?
AOther rules are ignored
BOnly outgoing traffic is denied
CIncidental traffic is still allowed
DTraffic matching allowed rules is accepted
Explanation
Firewall rules operate in a deny-all-except pattern; allowed traffic prevails unless blocked by a match.
Q463
Which service provides real-time notification of security incidents?
ACloud Audit Logs
BCloud Pub/Sub
CCloud Monitoring
DCloud Security Command Center
Explanation
Cloud Security Command Center provides comprehensive visibility and real-time notifications for security incidents; the others do not focus primarily on real-time security notifications.
Q464
A company needs to enforce DLP policies on sensitive data stored in GCP. Which feature is most appropriate?
AIAM Policies
BCloud Data Loss Prevention
CVPC Service Controls
DCloud Identity-Aware Proxy
Explanation
Cloud Data Loss Prevention (DLP) is specifically designed to discover and protect sensitive data, while others do not directly provide DLP functionalities.
Q465
You are configuring a firewall rule to allow traffic. What happens if the source IP range is set to `0.0.0.0/0`?
AOnly local traffic is allowed.
BOnly specific IPs are blocked.
CTraffic from anywhere is allowed.
DNo traffic is allowed.
Explanation
`0.0.0.0/0` allows traffic from anywhere, making it a broad permission; the other options falsely restrict or corrupt the definition of the CIDR notation.
Q466
Which service would you use for managing infrastructure as code in Google Cloud?
ACloud Deployment Manager
BCloud Functions
CCloud Monitoring
DCloud Pub/Sub
Explanation
Cloud Deployment Manager allows for infrastructure as code, while other options serve different purposes.
Q467
A company needs to securely store and manage its encryption keys. Which Google Cloud service should they utilize?
ACloud Storage
BCloud Key Management Service
CCloud SQL
DCloud Spanner
Explanation
Cloud Key Management Service is specifically designed for managing encryption keys safely, whereas the others do not focus on key management.
Q468
You are configuring IAM roles for a new project. What happens if a user is granted the viewer role but later added to a group with the editor role?
AUser only has viewer access
BUser has both viewer and editor access
CUser loses all permissions
DUser can only edit, not view
Explanation
IAM roles are additive, so the user retains both roles; others will not provide appropriate access levels or effects.
Q469
Which service provides identity and access management in Google Cloud?
AGoogle IAM
BGoogle Cloud Functions
CGoogle Cloud Storage
DGoogle Pub/Sub
Explanation
Google IAM is specifically designed for identity management, while the others serve different purposes.
Q470
A company needs to ensure minimum downtime during a scheduled maintenance. What approach should they take?
AUse Load Balancing
BImplement Multi-Region deployment
CShut down all instances during maintenance
DScale to zero before maintenance
Explanation
Multi-Region deployment enhances availability, whereas the others increase downtime.