This Quiz contains totally 25 Questions each carry 1 point for you.
1.What does IAM in Cloud IAM stand for?
Interface Access Management
Interface Authentication Management
Identity and Access Management
Integrated Application Management
Correct!
Wrong!
2.Which of the following are key features of Cloud IAM?
User management and access control
Data encryption
Key management
Compliance
Correct!
Wrong!
3.Data encryption at rest means:
Data is encrypted while being transferred over the network
Data is encrypted while it is stored in a database or storage system
Data is decrypted
None of the above
Correct!
Wrong!
4.Data encryption in transit refers to:
Encrypting data while it's being moved from one place to another
Encrypting data while it's stored
Decrypting data in transit
None of the above
Correct!
Wrong!
5.Cloud KMS is used for:
User management
Data encryption
Managing cryptographic keys
Auditing
Correct!
Wrong!
6.What does Cloud Logging provide?
Encryption services
Access control
Log management and analysis
Compliance policies
Correct!
Wrong!
7.What does Cloud Monitoring provide?
Cryptographic key management
Compliance policies
Monitoring services for cloud applications
User management
Correct!
Wrong!
8.The primary purpose of auditing in cloud services is to:
Encrypt data
Manage cryptographic keys
Monitor application performance
Verify compliance with security and regulatory standards
Correct!
Wrong!
9.What does GCP Organization Policy provide?
Data encryption
Log management
Compliance and governance controls
Cryptographic key management
Correct!
Wrong!
10.The primary benefit of Cloud KMS is:
Enhanced application performance
Log management
Simplified cryptographic key management
Compliance management
Correct!
Wrong!
11.Which of the following is not a component of the Cloud IAM policy model?
Members
Roles
Permissions
Encryption
Correct!
Wrong!
12.What is the purpose of resource-level IAM policies in GCP?
To define who (members) has what access (role) for which resource
To manage encryption keys
To monitor cloud resources
To log cloud operations
Correct!
Wrong!
13.Data encryption in transit in GCP is typically handled by:
SSL/TLS
Firewall
IAM roles
Auditing
Correct!
Wrong!
14.Cloud Monitoring is primarily used for:
Logging cloud operations
Managing encryption keys
Defining IAM policies
Observing the performance, uptime, and overall health of applications
Correct!
Wrong!
15.Which of the following is a responsibility of a cloud user under the shared responsibility model in GCP?
Physical security of data centers
Compliance with IAM policies
Encryption of data at rest
Management of GCP data centers
Correct!
Wrong!
16.Which of the following is a feature of Cloud KMS?
Log management
Management of cryptographic keys
Compliance management
IAM policy enforcement
Correct!
Wrong!
17.In GCP, where are the audit logs viewed?
Cloud KMS
Cloud IAM
Cloud Logging
Cloud Monitoring
Correct!
Wrong!
18.What is the function of Cloud IAM roles in GCP?
To manage cryptographic keys
To define a collection of permissions
To monitor cloud resources
To log cloud operations
Correct!
Wrong!
19.What type of data does Cloud Logging collect in GCP?
IAM policies
Cryptographic keys
Event and audit logs
User roles
Correct!
Wrong!
20.What does GCP Organization Policy provide?
User management
Cryptographic key management
Compliance and governance controls
Event logging
Correct!
Wrong!
21.Cloud KMS supports the creation and management of which of the following?
IAM roles
Audit logs
Cryptographic keys
Compliance policies
Correct!
Wrong!
22.What does data encryption at rest help protect against?
Unauthorized physical access
Network attacks
Application downtime
Role misconfigurations
Correct!
Wrong!
23.What does GCP's shared responsibility model mean in terms of security?
Only GCP is responsible for security
Both GCP and the user share responsibility for security
Only the user is responsible for security
Third-party vendors are responsible for security
Correct!
Wrong!
24.What is a primary purpose of Cloud Monitoring in GCP?
To encrypt data
To manage IAM roles
To monitor the performance of cloud resources
To manage cryptographic keys
Correct!
Wrong!
25.What would you use to manage access control in GCP?
Cloud KMS
Cloud IAM
Cloud Monitoring
Cloud Logging
Correct!
Wrong!
Share the quiz to show your results !
Subscribe to see your results
Ignore & go to results
GCP Data Engineering Data Security and Compliance – Quiz
You got %%score%% of %%total%% right
%%description%%
%%description%%
Loading...