Understanding Google Cloud Security and Operations Module 1 - 3 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is Google Cloud's principle for granting access to users? Select the correct answer.

"Least privilege"

An Identity Access Management policy, or IAM policy, is made of three parts. What are they? Select the correct answer.

"Who", "can do what", and "on which resource".

The tools included in Google Cloud's operations suite fall into what two major categories? Select two correct answers.

Application performance management tools & Operations-focused tools

Why is the expectation for 100% service availability misleading? Select the correct answer.

Because service maintenance is inevitable and requires downtime

How do cost management operations change when a company starts using a service-based cloud architecture? Select the correct answer.

Budgeting needs to be assessed on a daily, monthly, or weekly basis.

Which of the following are Google Cloud operations-focused tools? Select the two correct answers.

Cloud Monitoring & Cloud Logging

_____________ refers to breaking down silos and closing gaps between developer and operations teams? Select the correct answer.

DevOps

What Google Cloud security layer does "strong authentication for data access" relate to? Select the correct answer.

Identity

Julia is worried that some of her team members will accidentally overspend on Google Cloud. How would creating a custom dashboard help address her concern? Select the correct answer.

It would give her (and her teammates) greater visibility into costs.

Fraser has noticed that, in the past few months, several departments have been consistently exceeding their IT budgets. He needs to recommend solutions to control spending for each department. How would sharing cost views with these departments help him achieve his goal? Select the correct answer.

It would promote a culture of accountability.

You have received an email that says the following: "We have identified that your account is vulnerable. Click this link to change your security settings." What cybersecurity risks do you need to consider before clicking on the link? Select two correct answers.

Malware attacks on files & Phishing for sensitive data

What primary factors contribute to the complexity of calculating the total cost of ownership (TCO) when migrating to the cloud? Select the two correct answers.

Qualified personnel (i.e. Financial controller with expertise in cloud) & Cloud architecture (i.e. private, hybrid, and multi-cloud architecture)

What are the three components of Google Cloud's defense-in-depth data security design? Select the correct answer.

Sharding, encryption key, key encryption key

What is a service level objective (SLO)? Select the correct answer.

The goal for your cloud service performance level.

Google Cloud's tools offer four key benefits for managing cloud costs. What are they? Select the correct answer.

Visibility, accountability, control, intelligent recommendations.


Set pelajaran terkait

CFP - Retirement Planning: 457s & 403(b)s (Quizzes)

View Set

Kappa Alpha Psi Fraternity - Test II - Copy

View Set

Public Speaking Chapter 3 Key Terms, Review Questions, and Powerpoint

View Set

Maternal Child Nursing Care Chapter 13 Labor and Birth Process

View Set

Pregnant and Breastfeeding Ch. 25

View Set

Contracts Midterm Multiple Choice - Levit

View Set

International Contracts and Sales: Chapter 6

View Set