Understanding Google Cloud Security and Operations - Module 2: Security in the cloud Quiz Answers
Module 02: Security in the cloud
1. An Identity Access Management policy, or IAM policy, is made of three parts. What are they? Select the correct answer.
Answer: “Who”, “can do what”, and “on which resource”.
2. What is Google Cloud’s principle for granting access to users? Select the correct answer.
Answer: "Least privilege"
3. What are the three components of Google Cloud’s defense-in-depth data security design? Select the correct answer.
Answer: Sharding, encryption key, key encryption key
4. You have received an email that says the following: “We have identified that your account is vulnerable. Click this link to change your security settings.” What cybersecurity risks do you need to consider before clicking on the link? Select two correct answers
Answers:
- Phishing for sensitive data
- Malware attacks on files
5. What Google Cloud security layer does “strong authentication for data access” relate to? Select the correct answer.
Answer: Identity
Module1: Financial Governance in the Cloud Quiz Answers
Module 3 Monitoring Cloud IT Services and Operations Quiz Answers
This is part of Google Cloud Skills Boost.
Comments
Post a Comment