Understanding Google Cloud Security and Operations Flashcards
Google Cloud’s tools offer four key benefits for managing cloud costs. What are they? Select the correct answer.
a. Visibility, accountability, control, intelligent recommendations.
b. Measurability, scalability, accountability, intelligent recommendations.
c. Usability, accountability, control, measurability.
d. Scalability, visibility, control, affordability.
a. Visibility, accountability, control, intelligent recommendations.
What primary factors contribute to the complexity of calculating the total cost of ownership (TCO) when migrating to the cloud? Select the two correct answers.
a. Cloud architecture (i.e. private, hybrid, and multi-cloud architecture)
b. Product or service features (i.e. the ability to export or visualize data directly in a tool)
c. Qualified personnel (i.e. Financial controller with expertise in cloud)
d. Government regulations (i.e. location of data storage per 3rd part regulations)
a. Cloud architecture (i.e. private, hybrid, and multi-cloud architecture)
c. Qualified personnel (i.e. Financial controller with expertise in cloud)
Julia is worried that some of her team members will accidentally overspend on Google Cloud. How would creating a custom dashboard help address her concern? Select the correct answer.
a. It would streamline her budget allocation.
b. It would centralize their spending on cloud resources.
c. It would limit the number of people who could spin up resources.
d. It would give her (and her teammates) greater visibility into costs.
d. It would give her (and her teammates) greater visibility into costs.
Fraser has noticed that, in the past few months, several departments have been consistently exceeding their IT budgets. He needs to recommend solutions to control spending for each department. How would sharing cost views with these departments help him achieve his goal? Select the correct answer.
a. It would reduce duplication of cloud resources.
b. It would encourage collaboration between developers.
c. It would simplify assigning permissions for resources.
d. It would promote a culture of accountability.
d. It would promote a culture of accountability.
How do cost management operations change when a company starts using a service-based cloud architecture? Select the correct answer.
a. Budget planning needs to incorporate increased capital expenditure.
b. IT costs become less variable and are easier to measure.
c. IT costs become the responsibility of the cloud provider.
d. Budgeting needs to be assessed on a daily, monthly, or weekly basis.
d. Budgeting needs to be assessed on a daily, monthly, or weekly basis.
What are the three components of Google Cloud’s defense-in-depth data security design? Select the correct answer.
a. Sharding, biometric authentication, 2-factor authentication
b. Perimeter security, fingerprint authentication, globally distributed data storage
c. Categorized data, data encryption keys, globally distributed encryption keys
d. Sharding, encryption key, key encryption key
d. Sharding, encryption key, key encryption key
You have received an email that says the following: “We have identified that your account is vulnerable. Click this link to change your security settings.” What cybersecurity risks do you need to consider before clicking on the link? Select two correct answers.
a. Physical hard disk damage
b. Recruitment of security expertise
c. Phishing for sensitive data
d. Use of secured third-party systems
e. Malware attacks on files
c. Phishing for sensitive data
e. Malware attacks on files
What Google Cloud security layer does “strong authentication for data access” relate to? Select the correct answer.
a. Identity
b. Storage
c. Operations
d. Network
a. Identity
An Identity Access Management policy, or IAM policy, is made of three parts. What are they? Select the correct answer.
a. “What”, “can be solved”, and “with which software”.
b. “Where”, “can resources be allocated”, and “to verify identity”.
c. “Who”, “can do what”, and “on which resource”.
d. “How”, “can we please our customers”, and “with existing resources”.
c. “Who”, “can do what”, and “on which resource”.
What is Google Cloud’s principle for granting access to users? Select the correct answer.
a. “Restricted responsibility”
b. “Least privilege”
c. “Most privilege”
d. “Shared responsibility”
b. “Least privilege”
What is a service level objective (SLO)? Select the correct answer.
a. A continuous measure of your cloud’s availability.
b. An indicator of how well your service is doing at any moment in time.
c. The amount of unreliability you are willing to tolerate.
d. The goal for your cloud service performance level.
d. The goal for your cloud service performance level.
_____________ refers to breaking down silos and closing gaps between developer and operations teams? Select the correct answer.
a. DevOps
b. EngOps
c. Developer engineering
d. Site reliability engineering
a. DevOps
The tools included in Google Cloud’s operations suite fall into what two major categories? Select two correct answers.
a. Site reliability engineering tools
b. Data monitoring tools
c. Application performance management tools
d. Operations-focused tools
e. Hardware performance management tools
c. Application performance management tools
d. Operations-focused tools
Why is the expectation for 100% service availability misleading? Select the correct answer.
a. Because a business will inevitably experience talent attrition
b. Because systems will inevitably overheat over time
c. Because users are impacted if there’s less than 100% service availability
d. Because service maintenance is inevitable and requires downtime
d. Because service maintenance is inevitable and requires downtime
Which of the following are Google Cloud operations-focused tools? Select the two correct answers.
a. Cloud Profiler
b. Cloud Logging
c. Cloud Monitoring
d. Cloud Debugger
e. Cloud Trace
b. Cloud Logging
c. Cloud Monitoring