Security on GCP Day 1

Security on GCP Day 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

AWS Certified Cloud Practitioner

AWS Certified Cloud Practitioner

Professional Development

15 Qs

Class 2 Cycle 3

Class 2 Cycle 3

Professional Development

15 Qs

Section 1: What is Cloud Computing

Section 1: What is Cloud Computing

Professional Development

13 Qs

G suite quizz

G suite quizz

Professional Development

6 Qs

DIRECTV Training Quiz

DIRECTV Training Quiz

Professional Development

7 Qs

Network Ports

Network Ports

Professional Development

14 Qs

Google cloud introductory quiz GCP-CE 1

Google cloud introductory quiz GCP-CE 1

University - Professional Development

15 Qs

RAHS

RAHS

Professional Development

15 Qs

Security on GCP Day 1

Security on GCP Day 1

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Miguel Saavedra

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements are TRUE regarding Google's ability to protect its customers from DoS attacks?

Google Front End can detect when an attack is taking place and can drop or throttle traffic associated with that attack.

A single Google data center has many times the bandwidth of even a large DoS attack, enabling it to simply absorb the extra load.

Application-aware defense is not currently supported on Google Cloud, although support for this is planned in the very near future.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which ONE of the following statements is TRUE for the use of Cloud Identity?

Cloud Identity can work with any domain name that is able to receive email.

Your organization must use Google Workspace services in order to use Cloud Identity.

You cannot use both Cloud Identity and Google Workspace services to manage your users across your domain.

A Google Workspace or Cloud Identity account can be associated with more than one Organization.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main purpose of Google Cloud Directory Sync is to: (choose ONE option below)

Help simplify provisioning and deprovisioning user accounts.

Completely replace an Active Directory or LDAP service.

Enable two-way data synchronization between Google Cloud and AD/LDAP accounts.

Enable SSO between Cloud Identity and GCP

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following are considered authentication "best practices?"

Requiring 2-Step Verification (2SV) is only recommended for super-admin accounts.

You should have no more than three Organization admins.

Avoid managing permissions on an individual user basis where possible.

Organization Admins should never remove the default Organization-level permissions from users after account creation.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO of the following statements about IAM policies are TRUE?

A policy is a collection of access statements attached to a resource.

An organization policy can only be applied to the organization node.

A less restrictive parent policy will not override a more restrictive child resource policy.

A Policy binding binds a list of members to a role.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which ONE of the following statements is TRUE when discussing the SSL capabilities of the Google Cloud load balancer?

You must use one of the 3 pre-configured “Google-managed profiles” to specify the level of compatibility appropriate for your application.

Google Cloud load balancers require, and will only accept, a Google-managed SSL Cert.

The Google-managed profile, COMPATIBLE, allows clients which support out-of-date SSL features.

If no SSL policy is set, the SSL policy is automatically set to the most constrained policy, which is RESTRICTED.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your customer is moving their corporate applications to Google Cloud Platform. The security team wants detailed visibility of all resources in the organization. You use Resource Manager to set yourself up as the org admin. What Cloud Identity and Access Management (Cloud IAM) roles should you give to the security team?

Org viewer, Project owner

Org viewer, Project viewer

Org admin, Project browser

Project owner, Network admin

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?