What happens when two firewall rules conflict with each other for traffic?
AAllow rule takes precedence
BDeny rule takes precedence
CLast created rule wins
DTraffic is not affected
Explanation
Deny rules always take precedence over allow rules in GCP, ensuring stricter controls.
Q82
Which service enables data classification in Google Cloud?
AData Loss Prevention (DLP)
BCloud Pub/Sub
CCloud Storage
DCloud Functions
Explanation
DLP is designed for data classification, while others focus on messaging or storage.
Q83
A company needs to restrict access to its cloud resources based on user roles. Which approach should they use?
ADefine IAM policies
BUse VPC peering
CEnable Logging
DSet up Cloud Endpoints
Explanation
IAM policies allow for role-based access control, whereas others do not manage access directly.
Q84
What happens when you enable 'Cloud Armor' on a Google Cloud application?
AImproved load balancing
BDDoS event protection
CIncreased costs
DAutomatic resource scaling
Explanation
Cloud Armor provides DDoS protection; the others do not specify security features.
Q85
Which service allows for real-time threat detection?
ACloud Audit Logging
BCloud Security Command Center
CCloud Armor
DCloud Identity
Explanation
Cloud Security Command Center helps identify security issues, while others serve different purposes.
Q86
A company needs to securely store API keys. What is the best practice?
AStore in source code
BUse Secret Manager
CUse environment variables
DStore in text files
Explanation
Secret Manager encrypts and securely stores sensitive data compared to other methods listed.
Q87
What happens when you enable VPC Service Controls?
AReduces latency for services
BBlocks all external API calls
CEnhances data security boundaries
DAutomatically encrypts data
Explanation
VPC Service Controls help secure services by enabling defined security perimeters, unlike other options which misrepresent its functionality.
Q88
Which service can be used to monitor threats in Google Cloud?
ACloud Security Command Center
BCloud Pub/Sub
CCloud Functions
DCloud Storage
Explanation
Cloud Security Command Center provides threat monitoring, while others serve different functions.
Q89
A company needs to ensure compliance with GDPR regulations. Which service should they use to manage access to sensitive data?
ACloud IAM
BCloud Load Balancing
CCloud Scheduler
DCloud Run
Explanation
Cloud IAM manages access permissions, ensuring compliance, while the others are unrelated to access management.
Q90
What happens when you disable a Firewall Rule in Google Cloud?
AAll traffic is automatically denied
BAssociated resources become unreachable
CTraffic matching the rule is allowed
DThe rule is permanently deleted
Explanation
Disabling the rule allows matching traffic, while the others misinterpret the functionality of firewall rules.