Google Cloud Digital Leader Certification Module 08

Google Cloud Digital Leader Certification Module 08

Professional Development

14 Qs

quiz-placeholder

Similar activities

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

Cloud computing 2

Cloud computing 2

Professional Development

10 Qs

Maintain Files and Folders

Maintain Files and Folders

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

Professional Development

10 Qs

MS Excel practice

MS Excel practice

Professional Development

18 Qs

Google Cloud Digital Leader Certification Module 08

Google Cloud Digital Leader Certification Module 08

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

mia ormasa

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Your company security team manages access to control to production systems using an LDAP directory group. Hos is this access control managed in the Google Cloud production project?

Assign the proper role to the Service Account in the projects IAM Policy

Assign the proper role to the Google Group in the projects IAM Policy

Create the project in a folder with the same name as the LDAP directory group

Grant each user the roles/iam.serviceAccountUser role on a service account that exists in the Google Group

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Why is data stored in Google Cloud secure and private?

Data is encrypted by default

Data is encrypted by Cloud Data Loss Prevention

Data is encrypted when appropriate tag is applied

Data is encrypted by the Security Command Center

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Several departments in an organization are working together on a project. The organization wants to customize access to resources for each department. What is the quickest and most efficient way to achieve this?

By assigning IAM primitive roles to each employee

By applying least-privilege to roles for each employee

By creating a single shared service account for all departments

By mapping IAM roles to job functions for each department

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An organization is moving away from an on-premises infrastructure. Instead, they want to create, access, and share information virtually in the cloud. What should the organization consider?

Optimizing cost-management with a capital expenditure model

Built-in security when moving their data to the cloud

Optimizing cost-management with a capital expenditure model

Increased hardware capacity when moving their data to the cloud

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which cybersecurity threat can lead to information being stolen or damaged without a user ever being aware?

SLA policy violation

Malware attack

Ransomware attack

Incomplete data input

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An organization suffers a major data leak only six months after upgrading its security system. What should the organization do to ensure long-term security?

Extend data retention policy lengths to at least seven years

Pay more to get the best security system available on the market

Wait for a more advanced security system to be released

Hire cybersecurity experts to further develop their data security plan

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

How should a multinational organization that is migrating to Google Cloud consider security and privacy regulations to ensure that it is in compliance with global standards?

Comply with international standards for data security and privacy, because they supersede all regional regulations

Comply with regional data security regulations, because they're more complex than privacy standards

Comply with data security and privacy regulations in each geographical region

Comply with regional standards for data security and privacy, because they supersede all international regulations

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?