Get Graded Trust and Security with Google Cloud Quiz Answers
Table of Contents
Trust and Security with Google Cloud Module 02 Quiz Answers
Q1. Which security principle advocates granting users only the access they need to perform their job responsibilities?
Correct Answer: Least privilege
Explanation: The principle of least privilege restricts user access to the minimum necessary to perform their roles, reducing the risk of unauthorized actions.
Q2. Which definition best describes a firewall?
Correct Answer: A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules
Explanation: A firewall acts as a barrier between a trusted network and an untrusted network, filtering traffic based on security policies.
Q3. Which three essential aspects of cloud security form the foundation of the CIA triad?
Correct Answer: Confidentiality, integrity, and availability
Explanation: The CIA triad ensures data security by protecting confidentiality, maintaining integrity, and ensuring availability.
Q4. Which cloud security principle relates to keeping data accurate and trustworthy?
Correct Answer: Integrity
Explanation: Integrity ensures that data is accurate, consistent, and free from unauthorized modifications.
Q5. Which cloud security principle ensures that security practices and measures align with established standards and guidelines?
Correct Answer: Compliance
Explanation: Compliance ensures that security measures meet regulatory requirements and industry standards.
Q6. Which is the responsibility of the cloud provider in a cloud security model?
Correct Answer: Maintaining the customer’s infrastructure.
Explanation: Cloud providers are responsible for securing the infrastructure, while customers manage data and application security.
Q7. Which is a benefit of cloud security over traditional on-premises security?
Correct Answer: Increased scalability.
Explanation: Cloud security scales automatically to match workloads, unlike static on-premises security systems.
Q8. What common cybersecurity threat involves tricking users into revealing sensitive information or performing actions that compromise security?
Correct Answer: Phishing
Explanation: Phishing uses deceptive messages to lure users into divulging sensitive information or clicking on malicious links.
Q9. Which cybersecurity threat demands a ransom payment from a victim to regain access to their files and systems?
Correct Answer: Ransomware
Explanation: Ransomware encrypts a victim’s files and demands payment for the decryption key.
Q10. Which cybersecurity threat occurs when errors arise during the setup of resources, inadvertently exposing sensitive data and systems to unauthorized access?
Correct Answer: Configuration mishaps
Explanation: Misconfigured resources, such as open cloud storage buckets, can lead to unintentional exposure of sensitive information.
Trust and Security with Google Cloud Module 03 Quiz Answers
Q1. What metric does Google Cloud use to measure the efficiency of its data centers to achieve cost savings and a reduced carbon footprint?
Correct Answer: Power Usage Effectiveness (PUE)
Explanation: PUE is the standard metric for measuring the efficiency of a data center, comparing total facility energy usage to the energy used by IT equipment.
Q2. Google Cloud encrypts data at various states. Which state refers to when data is being actively processed by a computer?
Correct Answer: Data in use
Explanation: “Data in use” refers to data being actively processed in memory, as opposed to being stored or transmitted.
Q3. Which is a powerful encryption algorithm trusted by governments and businesses worldwide?
Correct Answer: Advanced Encryption Standard (AES)
Explanation: AES is a widely used encryption standard known for its strength and speed, approved for use by governments globally.
Q4. Which aspect of cloud identity management verifies the identity of users or systems?
Correct Answer: Authentication
Explanation: Authentication confirms a user’s or system’s identity, typically through passwords, biometrics, or security tokens.
Q5. What security feature adds an extra layer of protection to cloud-based systems?
Correct Answer: Two-step verification (2SV)
Explanation: Two-step verification (2SV) enhances security by requiring two forms of identification before granting access.
Q6. Select the correct statement about Identity and Access Management (IAM).
Correct Answer: IAM provides granular control over who has access to Google Cloud resources and what they can do with those resources.
Explanation: IAM enables detailed access controls to manage user permissions effectively within Google Cloud.
Q7. What Google Cloud product provides robust protection from harmful distributed denial-of-service (DDoS) attacks?
Correct Answer: Google Cloud Armor
Explanation: Google Cloud Armor helps protect applications from DDoS attacks and other malicious traffic.
Q8. Which practice involves a combination of processes and technologies that help reduce the risk of data breaches, system outages, and other security incidents in the cloud?
Correct Answer: Cloud security posture management (CSPM)
Explanation: CSPM helps organizations continuously monitor and manage cloud security risks, ensuring compliance and reducing vulnerabilities.
Trust and Security with Google Cloud Module 04 Quiz Answers
Q1. Which is one of Google Cloud’s seven trust principles?
Correct Answer: All customer data is encrypted by default.
Explanation: Google Cloud’s trust principles include commitments to security and privacy, such as encrypting customer data by default to ensure its protection.
Q2. Which report provides a way for Google Cloud to share data about how the policies and actions of governments and corporations affect privacy, security, and access to information?
Correct Answer: Transparency reports
Explanation: Google Cloud’s transparency reports detail requests from governments and other entities, promoting accountability and openness.
Q3. Which term describes the concept that data is subject to the laws and regulations of the country where it resides?
Correct Answer: Data sovereignty
Explanation: Data sovereignty refers to the legal concept that data is governed by the laws of the nation in which it is stored.
Q4. Which Google Cloud feature allows users to control their data’s physical location?
Correct Answer: Regions
Explanation: Regions in Google Cloud allow users to select specific physical locations for their data to comply with legal and performance requirements.
Q5. Where can you find details about certifications and compliance standards met by Google Cloud?
Correct Answer: Compliance resource center
Explanation: The Compliance Resource Center provides detailed information about Google Cloud’s certifications, standards, and compliance practices.
Get all course quiz answers of Google Cloud Digital Leader Training Professional Certificate
Introduction to Digital Transformation with Google Cloud Quiz Answers
Exploring Data Transformation with Google Cloud Quiz Answers
Innovating with Google Cloud Artificial Intelligence Quiz Answers
Modernize Infrastructure and Applications with Google Cloud Quiz Answers
Trust and Security with Google Cloud Quiz Answers