NPTEL

Google Cloud Computing Foundations Week 4 Quiz Answer

In this article i am gone to share NPTEL Course: Google Cloud Computing Foundations Week 4 Quiz Answer with you..ย 

Google Cloud Computing Foundations Week 4 Quiz Answer | NPTEL

Also visit: Google Cloud Computing Foundations Week 3 Quiz Answer

 

Week 4 Quiz Answer

Question 1) Which of the following is the most common API format in GCP?

  • CLI
  • gRPC
  • REST
  • SOAP

Question 2) What is the purpose of an API?

  • APIs replace web pages.
  • APIs create GUI interfaces
  • APIs are non-HTTPS interfaces used to interface with web interfaces.
  • APIs simplify the way disparate software resources communicate.

Question 3) Which of the following is the protocol used by REST APIs?

  • HTTPS
  • RDP
  • ICMP
  • Telnet

Question 4) True or False. Firebase Authentication and Auth0 are two of the utilities Cloud Endpoints uses to support service-to-service and user authentication.

  • True
  • False

Question 5) You are looking for a managed API service to provide an API frontend to your legacy systems. Which of these services would meet your needs?

  • CLI
  • gRPC
  • Cloud Endpoints
  • Apigee Edge

Question 6) What are the specifications that Cloud Endpoints supports?

  • CLI
  • RFC
  • IEEE
  • OpenAPI
  • gRPC

Question 7) You are looking for a managed API service for your cloud-based services? Which of these services would meet your needs?

  • CLI
  • False
  • Apigee Edge
  • Cloud Endpoints

Question 8) How does Cloud Pub/Sub deliver messages to endpoints?

  • Through an internal ID.
  • Through a publish/subscribe pattern
  • Messages have to be pulled by the front end.
  • By pushing messages to all available endpoints based on an internal list.

Question 9) What are the types of message delivery supported with Cloud Pub/Sub?

  • Pull
  • Poll
  • Push
  • Bounce

Question 10) You need a simple and reliable staging location for your event data on its journey towards processing, storage, and analysis. Which one of the followingย services should you consider?

  • Apigee Edge
  • Cloud Dataflow
  • Cloud Endpoints
  • Cloud Pub/Sub

Question 11) Which statement regarding GCP and data encryption is accurate?

  • Only data at rest is encrypted.
  • Only data in transit is encrypted.
  • Data is encrypted at rest and in transit.
  • Nothing is encrypted by default. Data must be encrypted by the customer.

Question 12) True or False. Managing GCP users through Google Groups allows an administrator to manage team identities centrally

  • True
  • False

Question 13) When comparing on-premises, IaaS, PaaS, and managed services, which option requires the least amount of work for the user in terms of security?

  • IaaS
  • PaaS
  • Managed service
  • On-premises

Question 14) Which of the following is the correct statement for a service account in GCP?

  • Lock down a user.
  • Create a user in GCP.
  • Give permissions to a group of users.
  • Allow for service-to-service interaction with GCP.

Question 17) What do primitive roles grant permissions to?

  • Folders
  • Resources
  • Projects
  • Organizations

Question 16) Which of the following is not an example of a primitive role?

  • Owner
  • Admin
  • Viewer
  • Editor

Question 17) When setting up user/role pairings in GCP, which of the following is true?

  • Permissions are not inherited.
  • Everyone is a project owner by default.
  • Permissions are inherited and the least restrictive permission will be inherited
  • The user will always inherit the stricter permission applied

Question 18) What service is used to supply encryption keys when users want to manage their own keys?

  • CloudHSM
  • Cloud Key Management System
  • Google is encrypted by default. No keys are required
  • The customer must bring their own keys and manage them

Question 19) There are a number of best practices that should be applied to identity and access management. Which of the following does Google recommend?

  • Use folders to group instances
  • Use custom roles for all objects
  • Try to use primitive roles instead of pre-defined roles
  • Use the โ€œprinciple of least privilegeโ€ when distributing permissions

Question 20) True or False. Cloud Identity-Aware Proxy (Cloud IAP) allows you to use an application-level access control model instead of relying on network-levelย firewalls

  • True
  • False

ย 

ย