This set of MCQ(multiple choice questions) focuses on the Google Cloud Computing Foundations Week 4 Answers
You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Google Cloud Computing Foundations Week 4 Answers“.
Course layout
Week 1: Assignment solutions
Week 2: Assignment solutions
Week 3: Assignment solutions
Week 4: Assignment solutions
Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Google Cloud Computing Foundations Week 4 Answers” contains 10 questions.
Now, start attempting the quiz.
Google Cloud Computing Foundations Week 4 Answers
Q1. Google Endpoint APIs can be authenticated using:
a) JSON web tokens
b) Passwords
c) Firebase auth
d) API keys
Answer: a), c), d)
Q2. Which of the following is/are applicable for Cloud Pub/Sub?
a) It is a software application that collects data from user
b) It exchange data directly between publisher and subscriber
c) It can not handle multiple applications
d) None of the above
Answer: d)
Q3. In the GCP shared security model, the security of identity in PaaS is managed by Google. Please mention whether the above statement is true/false.
a) True
b) False
Answer: a)
Q4. What are some of the limitations of using cloud storage for buckets and objects?
a) Data sovereignty
b) Performance
c) Compliance
d) Access control
Answer: a), b)
Q5. What are the different roles that can be assigned to users in IAM??
a) Owner
b) Editor
c) Viewer
d) Checker
Answer: a), b), c)
Q6. What of the following are the available versions of SHA?
a) SHA-1
b) SHA-266
c) SHA-512
d) SHA-777
Answer: a), c)
Q7. How does TLS encrypt data?
a) By using a symmetric encryption algorithm.
b) By using an asymmetric encryption algorithm.
c) By using a combination of symmetric and asymmetric encryption algorithms.
d) None of the above.
Answer: c)
Q8. Which of the following statements is true about APIs?
a) APIs are only used for web development.
b) APIs define the structure and behavior of a software system.
c) APIs can only be accessed by developers and programmers.
d) APIs are limited to communication between different programming languages
Answer: b)
Q9. What is the purpose of API keys in Cloud Endpoints?
a) To secure API endpoints against unauthorized access.
b) To generate dynamic documentation for the API.
c) To enable versioning and deployment of APIs.
d) To configure API traffic routing and load balancing.
Answer: a)
Q10. What is the role of Identity and Access Management (IAM) in authentication and authorization?
a) responsible for managing user roles and permissions.
b) ensures secure transmission of authentication data.
c) encrypts user credentials for secure storage.
d) audits and logs user activities for compliance purposes.
Answer: a)
<< Prev- Google Cloud Computing Foundations Week 3 Assignment Solutions
>> Next- Google Cloud Computing Foundations Week 5 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
Programming in Java NPTEL week 1 quiz answers
Nptel – Deep Learning assignment solutions
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.