Search Header Logo

GCP-SEC-5-6

Authored by Maciej Zachariasz

Education

1st - 5th Grade

Used 2+ times

GCP-SEC-5-6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following TWO statements about Google Cloud service accounts are TRUE?

VMs without service accounts cannot run APIs.

Service accounts are a type of identity.

Virtual machine (VM) instances use service accounts to run API requests on your behalf.

Custom service accounts use "scopes" to control API access.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO recommendations below ARE considered to be Compute Engine "best practices?"

Always run critical VMs with default, scope-based service accounts.

Utilize projects and IAM roles to control access to your VMs.

Hardened custom images, once added to your Organization's resources, are then maintained by Google with automatic security patches and other updates.

Cloud Interconnect or Cloud VPN can be used to securely extend your data center network into Google Cloud projects.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements is TRUE when discussing the Organization Policy Service?

Descendants of a targeted resource do not inherit the parent's Organization Policy.

Organization Policy Services allow centralized control for how your organization’s resources can be used.

To define an Organization Policy, you will choose and then define a constraint against either a Google Cloud service or a group of Google Cloud services.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements are TRUE when discussing Cloud Storage and IAM permissions?

Access can be granted to Cloud Storage at the organization, folder, project, or bucket levels.

It is possible to remove a permission from a lower level that was granted at a higher level.

Using IAM permissions alone gives you control over your projects and buckets, but does not give control over individual objects.

A user needs permission from both IAM or an ACL in order to access a bucket or object.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements are TRUE when discussing storage and BigQuery best practices?

In most cases, you should use Access Control Lists (ACLs) instead of IAM permissions.

BigQuery data can be adequately secured using the default basic roles available in Google Cloud.

Do not use any personally identifiable information as object names.

One option to serve content securely to outside users is to use signed URLs.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements is TRUE with regards to security in BigQuery and its datasets?

It is always better to assign BigQuery roles to individuals as this will help to lower operational overhead.

A BigQuery Authorized View allows administrators to restrict users to viewing only subsets of a dataset.

Using IAM, you can grant users granular permissions to BigQuery tables, rows and columns.

BigQuery has its own list of assignable IAM roles.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?