Understanding Google Cloud Security and Operations Module 1 - 3 Quiz
What is Google Cloud's principle for granting access to users? Select the correct answer.
"Least privilege"
An Identity Access Management policy, or IAM policy, is made of three parts. What are they? Select the correct answer.
"Who", "can do what", and "on which resource".
The tools included in Google Cloud's operations suite fall into what two major categories? Select two correct answers.
Application performance management tools & Operations-focused tools
Why is the expectation for 100% service availability misleading? Select the correct answer.
Because service maintenance is inevitable and requires downtime
How do cost management operations change when a company starts using a service-based cloud architecture? Select the correct answer.
Budgeting needs to be assessed on a daily, monthly, or weekly basis.
Which of the following are Google Cloud operations-focused tools? Select the two correct answers.
Cloud Monitoring & Cloud Logging
_____________ refers to breaking down silos and closing gaps between developer and operations teams? Select the correct answer.
DevOps
What Google Cloud security layer does "strong authentication for data access" relate to? Select the correct answer.
Identity
Julia is worried that some of her team members will accidentally overspend on Google Cloud. How would creating a custom dashboard help address her concern? Select the correct answer.
It would give her (and her teammates) greater visibility into costs.
Fraser has noticed that, in the past few months, several departments have been consistently exceeding their IT budgets. He needs to recommend solutions to control spending for each department. How would sharing cost views with these departments help him achieve his goal? Select the correct answer.
It would promote a culture of accountability.
You have received an email that says the following: "We have identified that your account is vulnerable. Click this link to change your security settings." What cybersecurity risks do you need to consider before clicking on the link? Select two correct answers.
Malware attacks on files & Phishing for sensitive data
What primary factors contribute to the complexity of calculating the total cost of ownership (TCO) when migrating to the cloud? Select the two correct answers.
Qualified personnel (i.e. Financial controller with expertise in cloud) & Cloud architecture (i.e. private, hybrid, and multi-cloud architecture)
What are the three components of Google Cloud's defense-in-depth data security design? Select the correct answer.
Sharding, encryption key, key encryption key
What is a service level objective (SLO)? Select the correct answer.
The goal for your cloud service performance level.
Google Cloud's tools offer four key benefits for managing cloud costs. What are they? Select the correct answer.
Visibility, accountability, control, intelligent recommendations.