/  GCP Data Engineering Data Security and Compliance – Quiz

This Quiz contains totally 25 Questions each carry 1 point for you.

1.What does IAM in Cloud IAM stand for?
Interface Access Management
Interface Authentication Management
Identity and Access Management
Integrated Application Management

Correct!

Wrong!

2.Which of the following are key features of Cloud IAM?
User management and access control
Data encryption
Key management
Compliance

Correct!

Wrong!

3.Data encryption at rest means:
Data is encrypted while being transferred over the network
Data is encrypted while it is stored in a database or storage system
Data is decrypted
None of the above

Correct!

Wrong!

4.Data encryption in transit refers to:
Encrypting data while it's being moved from one place to another
Encrypting data while it's stored
Decrypting data in transit
None of the above

Correct!

Wrong!

5.Cloud KMS is used for:
User management
Data encryption
Managing cryptographic keys
Auditing

Correct!

Wrong!

6.What does Cloud Logging provide?
Encryption services
Access control
Log management and analysis
Compliance policies

Correct!

Wrong!

7.What does Cloud Monitoring provide?
Cryptographic key management
Compliance policies
Monitoring services for cloud applications
User management

Correct!

Wrong!

8.The primary purpose of auditing in cloud services is to:
Encrypt data
Manage cryptographic keys
Monitor application performance
Verify compliance with security and regulatory standards

Correct!

Wrong!

9.What does GCP Organization Policy provide?
Data encryption
Log management
Compliance and governance controls
Cryptographic key management

Correct!

Wrong!

10.The primary benefit of Cloud KMS is:
Enhanced application performance
Log management
Simplified cryptographic key management
Compliance management

Correct!

Wrong!

11.Which of the following is not a component of the Cloud IAM policy model?
Members
Roles
Permissions
Encryption

Correct!

Wrong!

12.What is the purpose of resource-level IAM policies in GCP?
To define who (members) has what access (role) for which resource
To manage encryption keys
To monitor cloud resources
To log cloud operations

Correct!

Wrong!

13.Data encryption in transit in GCP is typically handled by:
SSL/TLS
Firewall
IAM roles
Auditing

Correct!

Wrong!

14.Cloud Monitoring is primarily used for:
Logging cloud operations
Managing encryption keys
Defining IAM policies
Observing the performance, uptime, and overall health of applications

Correct!

Wrong!

15.Which of the following is a responsibility of a cloud user under the shared responsibility model in GCP?
Physical security of data centers
Compliance with IAM policies
Encryption of data at rest
Management of GCP data centers

Correct!

Wrong!

16.Which of the following is a feature of Cloud KMS?
Log management
Management of cryptographic keys
Compliance management
IAM policy enforcement

Correct!

Wrong!

17.In GCP, where are the audit logs viewed?
Cloud KMS
Cloud IAM
Cloud Logging
Cloud Monitoring

Correct!

Wrong!

18.What is the function of Cloud IAM roles in GCP?
To manage cryptographic keys
To define a collection of permissions
To monitor cloud resources
To log cloud operations

Correct!

Wrong!

19.What type of data does Cloud Logging collect in GCP?
IAM policies
Cryptographic keys
Event and audit logs
User roles

Correct!

Wrong!

20.What does GCP Organization Policy provide?
User management
Cryptographic key management
Compliance and governance controls
Event logging

Correct!

Wrong!

21.Cloud KMS supports the creation and management of which of the following?
IAM roles
Audit logs
Cryptographic keys
Compliance policies

Correct!

Wrong!

22.What does data encryption at rest help protect against?
Unauthorized physical access
Network attacks
Application downtime
Role misconfigurations

Correct!

Wrong!

23.What does GCP's shared responsibility model mean in terms of security?
Only GCP is responsible for security
Both GCP and the user share responsibility for security
Only the user is responsible for security
Third-party vendors are responsible for security

Correct!

Wrong!

24.What is a primary purpose of Cloud Monitoring in GCP?
To encrypt data
To manage IAM roles
To monitor the performance of cloud resources
To manage cryptographic keys

Correct!

Wrong!

25.What would you use to manage access control in GCP?
Cloud KMS
Cloud IAM
Cloud Monitoring
Cloud Logging

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

Ignore & go to results

GCP Data Engineering Data Security and Compliance – Quiz

You got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...