Question 40 of 300
hardmultiple choiceObjective-mapped

ACE Practice Question: A security team wants to prevent authorized users…

This ACE practice question tests your understanding of a security team wants to prevent authorized users…. The scenario asks you to isolate a root cause — eliminate options that address a different problem before choosing. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.

A security team wants to prevent authorized users from copying BigQuery query results to a dataset in a different GCP project that is outside the team's security boundary — even if the user has valid IAM permissions. Which control enforces this?

Question 1hardmultiple choice
Full question →

A security team wants to prevent authorized users from copying BigQuery query results to a dataset in a different GCP project that is outside the team's security boundary — even if the user has valid IAM permissions. Which control enforces this?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

IAM deny policies restricting cross-project BigQuery operations

IAM deny policies block specific IAM actions — they don't prevent an authorized user from copying data to an external project if they have the necessary permissions there.

B

Best answer

VPC Service Controls with a perimeter enclosing BigQuery

VPC Service Controls enforce context-aware access at the API level — data can't leave the perimeter to external projects regardless of IAM permissions, preventing exfiltration.

C

Distractor review

An organization policy preventing resource creation outside specific projects

Organization policies restrict what types of resources can be created — they don't prevent copying data between existing projects.

D

Distractor review

Cloud Armor rules blocking outbound API requests to BigQuery in other projects

Cloud Armor is a WAF for incoming HTTP traffic to load balancers — it doesn't control GCP API calls between projects.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Key takeaway

ACLs process entries top to bottom and stop at the first match. Entry order and interface direction matter as much as the permit or deny statement.

Related practice questions

Related ACE practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Practice this exam

Start a free ACE practice session

Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.

FAQ

Questions learners often ask

What does this ACE question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: VPC Service Controls with a perimeter enclosing BigQuery — VPC Service Controls create a security perimeter around GCP services. Even users with valid IAM permissions cannot transfer data between services inside the perimeter and those outside it. This prevents data exfiltration scenarios where an authorized user exports data to an external project.

What should I do if I get this ACE question wrong?

Review ACL processing order, placement rules (standard near destination, extended near source), and inbound vs outbound direction. Study wildcard masks and implicit deny. Then practise related ACE ACL questions on filtering logic and placement.

About these practice questions

Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →

How Courseiva writes practice questions · Editorial policy

Discussion

Loading comments…

Sign in to join the discussion.

This ACE practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the ACE exam.