Google Cloud Computing Foundations | NPTEL | Week 4 Answers

This set of MCQ(multiple choice questions) focuses on the Google Cloud Computing Foundations Week 4 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Google Cloud Computing Foundations Week 4 Answers“.

Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Google Cloud Computing Foundations Week 4 Answers” contains 10 questions.

Now, start attempting the quiz.

Google Cloud Computing Foundations Week 4 Answers

Q1. Google Endpoint APIs can be authenticated using:

a) JSON web tokens
b) Passwords
c) Firebase auth
d) API keys

Answer: a), c), d)

Google Cloud Computing Foundations Week 4 Answers

Q2. Which of the following is/are applicable for Cloud Pub/Sub?

a) It is a software application that collects data from user
b) It exchange data directly between publisher and subscriber
c) It can not handle multiple applications
d) None of the above

Answer: d)

Q3. In the GCP shared security model, the security of identity in PaaS is managed by Google. Please mention whether the above statement is true/false.

a) True
b) False

Answer: a)

Q4. What are some of the limitations of using cloud storage for buckets and objects?

a) Data sovereignty
b) Performance
c) Compliance
d) Access control

Answer: a), b)

Google Cloud Computing Foundations Week 4 Answers

Q5. What are the different roles that can be assigned to users in IAM??

a) Owner
b) Editor
c) Viewer
d) Checker

Answer: a), b), c)

Q6. What of the following are the available versions of SHA?

a) SHA-1
b) SHA-266
c) SHA-512
d) SHA-777

Answer: a), c)

Q7. How does TLS encrypt data?

a) By using a symmetric encryption algorithm.
b) By using an asymmetric encryption algorithm.
c) By using a combination of symmetric and asymmetric encryption algorithms.
d) None of the above.

Answer: c)

Google Cloud Computing Foundations Week 4 Answers

Q8. Which of the following statements is true about APIs?

a) APIs are only used for web development.
b) APIs define the structure and behavior of a software system.
c) APIs can only be accessed by developers and programmers.
d) APIs are limited to communication between different programming languages

Answer: b)

Q9. What is the purpose of API keys in Cloud Endpoints?

a) To secure API endpoints against unauthorized access.
b) To generate dynamic documentation for the API.
c) To enable versioning and deployment of APIs.
d) To configure API traffic routing and load balancing.

Answer: a)

Q10. What is the role of Identity and Access Management (IAM) in authentication and authorization?

a) responsible for managing user roles and permissions.
b) ensures secure transmission of authentication data.
c) encrypts user credentials for secure storage.
d) audits and logs user activities for compliance purposes.

Answer: a)

Google Cloud Computing Foundations Week 4 Answers

<< Prev- Google Cloud Computing Foundations Week 3 Assignment Solutions

>> Next- Google Cloud Computing Foundations Week 5 Assignment Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *