GCP-SEC-9-10

GCP-SEC-9-10

1st - 5th Grade

5 Qs

quiz-placeholder

Similar activities

Bài 3: Tổ chức và truy cập thông tin trên Internet

Bài 3: Tổ chức và truy cập thông tin trên Internet

1st - 10th Grade

10 Qs

GOOGLE CLASSROOM

GOOGLE CLASSROOM

3rd Grade

10 Qs

Aplicaciones Educativas

Aplicaciones Educativas

5th Grade

10 Qs

iOS

iOS

1st - 12th Grade

10 Qs

Google Slides

Google Slides

3rd Grade

10 Qs

AWS Cloud Prueba - 01

AWS Cloud Prueba - 01

1st Grade

6 Qs

Castles

Castles

5th - 7th Grade

10 Qs

ทดสอบหลังอบรม ดิจิทัล

ทดสอบหลังอบรม ดิจิทัล

1st Grade - Professional Development

10 Qs

GCP-SEC-9-10

GCP-SEC-9-10

Assessment

Quiz

Education

1st - 5th Grade

Hard

Created by

Maciej Zachariasz

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose from the list below the TWO ways that Google Cloud helps mitigate the risk of DDoS for its customers.

Google Blocklist API is automatically included within each project.

Internal capacity many times that of any traffic load we can anticipate.

Isolation servers are available with no external or internal access.

State-of-the-art physical security for hardware and servers.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following statements is TRUE about Google Cloud Armor?

Google Cloud Armor currently is not compatible with any third-party partner security products.

Google Cloud Armor enforces access control based on IPv4 and IPv6 addresses or CIDRs.

Google Cloud Armor is a Ransomware defense service.

Google Cloud Armor protection is delivered at the edge of Google’s network.

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following statements are TRUE when speaking about content-related security threats?

Public, user-supplied reviews, images, or videos are considered "safe content" and generally do not require additional security oversight.

Ransomware is a type of malicious software exploit that threatens to publish or perpetually block access to data unless money is paid.

Screenshots or other images that are made public without redaction can trigger a content-related cyber attack threat.

Tracking and unmasking ransomware attackers, via incoming ransom payments, is usually not very difficult with today's modern banking systems.

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following options are ways that Google Cloud automates for customers the mitigation of many content threats?

Google has global visibility into malicious sites and content, and is able to warn incoming users of suspected malware.

In Compute Engine, all files are scanned for ransomware type security breaches before uploading.

In Google Drive, all files will undergo a malware scan prior to any file download or file sharing attempt.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following tools does Google Cloud make available to customers for the mitigation of content-related security threats?

Clean Data API

Cloud Data Loss Prevention API

Cloud Natural Language API

Text Redaction API