Security on GCP Day 1

Security on GCP Day 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Reflection Monday

Reflection Monday

KG - Professional Development

14 Qs

Virtual Training, Teaching, and Learning Toolkit

Virtual Training, Teaching, and Learning Toolkit

Professional Development

15 Qs

Blended Learning

Blended Learning

Professional Development

10 Qs

G Suite Fundamentals

G Suite Fundamentals

Professional Development

10 Qs

SJUSD Technology Services

SJUSD Technology Services

Professional Development

10 Qs

BFF: Technology 101

BFF: Technology 101

Professional Development

11 Qs

Cloud Computing Through G Suite for Education

Cloud Computing Through G Suite for Education

Professional Development

10 Qs

Google Drive for UP

Google Drive for UP

Professional Development

10 Qs

Security on GCP Day 1

Security on GCP Day 1

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Miguel Saavedra

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements are TRUE regarding Google's ability to protect its customers from DoS attacks?

Google Front End can detect when an attack is taking place and can drop or throttle traffic associated with that attack.

A single Google data center has many times the bandwidth of even a large DoS attack, enabling it to simply absorb the extra load.

Application-aware defense is not currently supported on Google Cloud, although support for this is planned in the very near future.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which ONE of the following statements is TRUE for the use of Cloud Identity?

Cloud Identity can work with any domain name that is able to receive email.

Your organization must use Google Workspace services in order to use Cloud Identity.

You cannot use both Cloud Identity and Google Workspace services to manage your users across your domain.

A Google Workspace or Cloud Identity account can be associated with more than one Organization.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main purpose of Google Cloud Directory Sync is to: (choose ONE option below)

Help simplify provisioning and deprovisioning user accounts.

Completely replace an Active Directory or LDAP service.

Enable two-way data synchronization between Google Cloud and AD/LDAP accounts.

Enable SSO between Cloud Identity and GCP

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following are considered authentication "best practices?"

Requiring 2-Step Verification (2SV) is only recommended for super-admin accounts.

You should have no more than three Organization admins.

Avoid managing permissions on an individual user basis where possible.

Organization Admins should never remove the default Organization-level permissions from users after account creation.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements about IAM policies are TRUE?

A policy is a collection of access statements attached to a resource.

An organization policy can only be applied to the organization node.

A less restrictive parent policy will not override a more restrictive child resource policy.

A Policy binding binds a list of members to a role.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which ONE of the following statements is TRUE when discussing the SSL capabilities of the Google Cloud load balancer?

You must use one of the 3 pre-configured “Google-managed profiles” to specify the level of compatibility appropriate for your application.

Google Cloud load balancers require, and will only accept, a Google-managed SSL Cert.

The Google-managed profile, COMPATIBLE, allows clients which support out-of-date SSL features.

If no SSL policy is set, the SSL policy is automatically set to the most constrained policy, which is RESTRICTED.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your customer is moving their corporate applications to Google Cloud Platform. The security team wants detailed visibility of all resources in the organization. You use Resource Manager to set yourself up as the org admin. What Cloud Identity and Access Management (Cloud IAM) roles should you give to the security team?

Org viewer, Project owner

Org viewer, Project viewer

Org admin, Project browser

Project owner, Network admin

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?