Week 04 Assignment Solution
Week 04 Assignment Solution
QUESTION 1:
Google Endpoint APIs can be authenticated using:
QUESTION 2:
Which of the following is/are applicable for Cloud Pub/Sub?
a) it is a software application that collects data from user
b) it exchange data directly between publisher and subscriber
c) it can not handle multiple applications
d) none of the above
QUESTION 3:
In the GCP shared security model, the security of identity in PaaS is managed by Google.
Please mention whether the above statement is true/false.
a) True
b) False
1
NPTEL Online Certification Courses
Detailed Solution: The security of identity in SaaS and PasS is managed by Google but it is
managed the customer/user in case of IaaS.
QUESTION 4:
What are some of the limitations of using cloud storage for buckets and objects?
a) Data sovereignty.
b) Performance.
c) Compliance.
d) Access control.
Detailed Solution: Cloud storage providers may not be located in the same country as the data
owner, which can raise data sovereignty concerns. Cloud storage can have slower performance than
on-premises storage.
QUESTION 5:
What are the different roles that can be assigned to users in IAM??
a) Owner
b) Editor
c) Viewer
d) Checker
QUESTION 6:
What of the following are the available versions of SHA?
a) SHA-1
b) SHA-266
c) SHA-512
d) SHA-777
2
NPTEL Online Certification Courses
QUESTION 7:
How does TLS encrypt data?
a) By using a symmetric encryption algorithm.
b) By using an asymmetric encryption algorithm.
c) By using a combination of symmetric and asymmetric encryption algorithms.
d) None of the above.
QUESTION 8:
Which of the following statements is true about APIs?
a) APIs are only used for web development.
b) APIs define the structure and behavior of a software system.
c) APIs can only be accessed by developers and programmers.
d) APIs are limited to communication between different programming languages
QUESTION 9:
What is the purpose of API keys in Cloud Endpoints?
a) To secure API endpoints against unauthorized access.
b) To generate dynamic documentation for the API.
c) To enable versioning and deployment of APIs.
d) To configure API traffic routing and load balancing.
3
NPTEL Online Certification Courses
QUESTION 10:
What is the role of Identity and Access Management (IAM) in authentication and authorization?
a) responsible for managing user roles and permissions.
b) ensures secure transmission of authentication data.
c) encrypts user credentials for secure storage.
d) audits and logs user activities for compliance purposes.