All Coursera Quiz Answers

Mitigating Security Vulnerabilities on Google Cloud Coursera Quiz Answers

In this article i am gone to share Coursera Course: Mitigating Security Vulnerabilities on Google Cloud Coursera Quiz Answers with you..

Enrol Link:  Mitigating Security Vulnerabilities on Google Cloud

Mitigating Security Vulnerabilities on Google Cloud Coursera Quiz Answers


 

Protecting against DDoS Attacks Quiz Answers

Question 1)
Choose the FOUR correct DDoS Mitigation Layers from the list below.

  • Load Balancing
  • Attack Surface
  • CDN Offloading
  • Internal Traffic
  • Botnet Detection API
  • Ping Report
  • Google Cloud Blocklist

Question 2)
Choose from the list below which way Google Cloud helps mitigate the risk of DDoS for its customers.

  • Internal capacity many times that of any traffic load we can anticipate.
  • Google Cloud firewall rules rate limit the number of requests sent to VMs.
  • Google Blocklist API is automatically included within each project.
  • Isolation servers are available with no external or internal access.

Question 3)
Which TWO of the following statements is TRUE about Google Cloud Armor?

  • Google Cloud Armor protection is delivered at the edge of Google’s network.
  • Google Cloud Armor enforces access control based on IPv4 and IPv6 addresses or CIDRs.
  • Google Cloud Armor currently is not compatible with any third-party partner security products.
  • Google Cloud Armor is a Ransomware defense service.

 

Content-Related Vulnerabilities Quiz Answers

Question 1)
Which TWO of the following statements are TRUE when speaking about content-related security threats?

  • Ransomware is a type of malicious software exploit that threatens to publish or perpetually block access to data unless money is paid.
  • Screenshots or other images that are made public without redaction can trigger a content-related cyber attack threat.
  • Tracking and unmasking ransomware attackers, via incoming ransom payments, is usually not very difficult with today’s modern banking systems.
  • Public, user-supplied reviews, images, or videos are considered “safe content” and generally do not require additional security oversight.

Question 2)
Which TWO of the following options are ways that Google Cloud automates for customers the mitigation of many content threats?

  • Google has global visibility into malicious sites and content, and is able to warn incoming users of suspected malware.
  • In Google Drive, all files will undergo a malware scan prior to any file download or file sharing attempt.
  • In Compute Engine, all files are scanned for ransomware type security breaches before uploading,

Question 3)
Which TWO of the following tools does Google Cloud make available to customers for the mitigation of content-related security threats?

  • Cloud Data Loss Prevention API
  • Cloud Natural Language API
  • Text Redaction API
  • Clean Data API

 

Monitoring, Logging, Auditing and Scanning Quiz Answers

Question 1)
Which TWO of the following statements about Cloud Monitoring and Cloud Logging are TRUE?

  • While Cloud Logging is not built-in to most Google Cloud services, you can easily add it for a reasonable fee.
  • Cloud Monitoring and Cloud Logging retain logs for an indefinite period of time.
  • The Cloud Logging Agent can be installed on both Compute Engine and AWS EC2 instances.
  • You can analyze log data in BigQuery.

Question 2)
Which TWO of the following statements about Cloud Audit Logs are TRUE?

  • Enabling Data Access audit logs might result in your project being charged for the additional logs usage.
  • Unlike Cloud Logging logs, you cannot export Cloud Audit Logs entries to BigQuery.
  • Data Access audit logs record data-access operations on resources that are publicly shared.
  • Cloud Audit Logs maintains three audit logs for each project, folder, and organization.

Question 3)
Which one of the following statements about Security Command Center is NOT true?

  • Security Command Center helps you prevent, detect, and respond to threats.
  • Security Command Center requires three IAM administrative permissions to set up
  • Security Command Center provides a centralized view for cloud resources.
  • Security Command Center works by generating “findings” associated with assets.

Question 4)
Which one of the following is NOT a benefit for automating security in Google Cloud environments?

  • While beneficial in some situations, the time invested in automating certain tasks is not worth it due to a lack of Google Cloud services that support this framework.
  • Once you have encapsulated some task in automation, anyone can execute the task.
  • Security automation allows scaling faster than the growth of threats and assets.
  • Security automation Improves consistency, quickness, and reliability.