Trust and Security in the Cloud - Google’s Trusted Infrastructure Quiz Answers - Navi Era - Tech | Tutorial

Breaking

Sunday, December 1, 2024

Trust and Security in the Cloud - Google’s Trusted Infrastructure Quiz Answers


Trust and Security in the Cloud - Google’s Trusted Infrastructure Quiz Answers

Trust and Security in the Cloud - Google’s Trusted Infrastructure Quiz Questions and Answers


Q1. What metric does Google Cloud use to measure the efficiency of its data centers to achieve cost savings and a reduced carbon footprint?

Option 1: Energy Efficiency Ratio (EER)

Option 2: Data Center Infrastructure Efficiency (DCiE)

Option 3: Total Cost of Ownership (TCO)

Option 4: Power Usage Effectiveness (PUE)



Q2. Google Cloud encrypts data at various states. Which state refers to when data is being actively processed by a computer?

Option 1: Data in use

Option 2: Data lake

Option 3: Data at rest

Option 4: Data in transit



Q3. Which is a powerful encryption algorithm trusted by governments and businesses worldwide?

Option 1: Isomorphic Encryption (IE)

Option 2: Lattice-Based Cryptography (LBC)

Option 3: Post-Quantum Cryptography (PQC)

Option 4: Advanced Encryption Standard (AES)


Q4. Select the correct statement about Identity and Access Management (IAM).

Option 1: IAM provides granular control over who has access to Google Cloud resources and what they can do with those resources.

Option 2: IAM is a cloud service that encrypts cloud-based data at rest and in transit.

Option 3: IAM is a cloud security information and event management solution that collects and analyzes log data from cloud security devices and applications.

Option 4: IAM is a system that detects and prevents malicious traffic from entering a cloud network.


Q5. Which practice involves a combination of processes and technologies that help reduce the risk of data breaches, system outages, and other security incidents in the cloud?

Option 1: Site Reliability Engineering (SRE)

Option 2: Zero Trust Security

Option 3: Security Operations (SecOps)

Option 4: Cloud Security Posture Management (CSPM)


Q6. Which aspect of cloud identity management verifies the identity of users or systems?

Option 1: Authorization

Option 2: Auditing

Option 3: Authentication

Option 4: Accounting


Q7. What security feature adds an extra layer of protection to cloud-based systems?

Option 1: Firewall as a Service (FaaS)

Option 2: Data Loss Prevention (DLP)

Option 3: Security Information and Event Management (SIEM)

Option 4: Two-Step Verification (2SV)


Q8. What Google Cloud product provides robust protection from harmful distributed denial-of-service (DDoS) attacks?

Option 1: Cloud Load Balancing

Option 2: Cloud IAM

Option 3: Cloud Monitoring

Option 4: Google Cloud Armor







No comments:

Post a Comment

What do you think about this article? just write your feedback in the comment box. Thanks :)

WhatsApp
Telegram