Security on GCP Day 2

Security on GCP Day 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Google cloud introductory quiz GCP-CE 1

Google cloud introductory quiz GCP-CE 1

University - Professional Development

15 Qs

Let's go

Let's go

Professional Development

10 Qs

Cloud Computing- Revision 1

Cloud Computing- Revision 1

Professional Development

15 Qs

DevOps Pro

DevOps Pro

Professional Development

10 Qs

AWS CCP q31-40

AWS CCP q31-40

Professional Development

10 Qs

Section 1: What is Cloud Computing

Section 1: What is Cloud Computing

Professional Development

13 Qs

SCS-Day 2019 Quiz Contest

SCS-Day 2019 Quiz Contest

Professional Development

15 Qs

AWS Certified Cloud Practitioner

AWS Certified Cloud Practitioner

Professional Development

15 Qs

Security on GCP Day 2

Security on GCP Day 2

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Miguel Saavedra

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following TWO statements about Google Cloud service accounts are TRUE?

VMs without service accounts cannot run APIs.

Service accounts are a type of identity.

Virtual machine (VM) instances use service accounts to run API requests on your behalf.

Custom service accounts use "scopes" to control API access.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO recommendations below ARE considered to be Compute Engine "best practices?"

Always run critical VMs with default, scope-based service accounts.

Utilize projects and IAM roles to control access to your VMs.

Hardened custom images, once added to your Organization's resources, are then maintained by Google with automatic security patches and other updates.

Cloud Interconnect or Cloud VPN can be used to securely extend your data center network into Google Cloud projects.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is FALSE when discussing the Organization Policy Service?

Descendants of a targeted resource do not inherit the parent's Organization Policy.

Organization Policy Services allow centralized control for how your organization’s resources can be used.

To define an Organization Policy, you will choose and then define a constraint against either a Google Cloud service or a group of Google Cloud services.

Organization Policy Services are available at no cost to all Google Cloud Platform Customers

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following statements are TRUE when discussing storage and BigQuery best practices?

In most cases, you should use Access Control Lists (ACLs) instead of IAM permissions.

BigQuery data can be adequately secured using the default basic roles available in Google Cloud.

Do not use any personally identifiable information as object names.

One option to serve content securely to outside users is to use signed URLs.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which TWO of the following statements is TRUE with regards to security in BigQuery and its datasets?

It is always better to assign BigQuery roles to individuals as this will help to lower operational overhead.

A BigQuery Authorized View allows administrators to restrict users to viewing only subsets of a dataset.

Using IAM, you can grant users granular permissions to BigQuery tables, rows and columns.

BigQuery has its own list of assignable IAM roles.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements about Application Security is TRUE?

Developers are commonly given a requirements document that clearly defines security requirements for the application.

Applications are the most common target of cyber attack.

"Injection Flaws" are the least frequently found application security issue.

Applications in general, including many web applications, do not need to properly protect sensitive user data.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following are common application security vulnerabilities that Web Security Scanner can find?

Insecure logins.

Mixed HTTP and HTTPS content.

Outdated or insecure libraries.

Personalized data in object names.

User data in images.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?