0% found this document useful (0 votes)
93 views4 pages

Week 04 Assignment Solution

This document contains a 10 question multiple choice quiz on topics related to Google Cloud Computing foundations. The questions cover topics like authentication methods for Google Endpoint APIs, the purpose of Cloud Pub/Sub, security models in PaaS, limitations of cloud storage, roles in IAM, versions of SHA, how TLS encrypts data, the purpose of APIs, the use of API keys in Cloud Endpoints, and the role of IAM in authentication and authorization. For each question, the correct answer and a detailed explanation is provided.

Uploaded by

tipon82206
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views4 pages

Week 04 Assignment Solution

This document contains a 10 question multiple choice quiz on topics related to Google Cloud Computing foundations. The questions cover topics like authentication methods for Google Endpoint APIs, the purpose of Cloud Pub/Sub, security models in PaaS, limitations of cloud storage, roles in IAM, versions of SHA, how TLS encrypts data, the purpose of APIs, the use of API keys in Cloud Endpoints, and the role of IAM in authentication and authorization. For each question, the correct answer and a detailed explanation is provided.

Uploaded by

tipon82206
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Google Cloud Computing Foundations


(Jul-Oct 2023)
Assignment- Week 4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1:
Google Endpoint APIs can be authenticated using:

a) JSON web tokens


b) Passwords
c) Firebase auth
d) API keys

Correct Answer: (a), (c), and (d)


Detailed Solution: Google Endpoint API can be authenticated using JSON web tokens, Firebase
auth, API keys but not with the help of passwords

QUESTION 2:
Which of the following is/are applicable for Cloud Pub/Sub?
a) it is a software application that collects data from user
b) it exchange data directly between publisher and subscriber
c) it can not handle multiple applications
d) none of the above

Correct Answer: (d)


Detailed Solution: Cloud Pub/Sub is a middleware, exchange data through message stores, and can
act as a buffer between multiple applications.

QUESTION 3:
In the GCP shared security model, the security of identity in PaaS is managed by Google.
Please mention whether the above statement is true/false.

a) True
b) False

Correct Answer: (a)

1
NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Detailed Solution: The security of identity in SaaS and PasS is managed by Google but it is
managed the customer/user in case of IaaS.

QUESTION 4:
What are some of the limitations of using cloud storage for buckets and objects?
a) Data sovereignty.
b) Performance.
c) Compliance.
d) Access control.

Correct Answer: (a) and (b)

Detailed Solution: Cloud storage providers may not be located in the same country as the data
owner, which can raise data sovereignty concerns. Cloud storage can have slower performance than
on-premises storage.

QUESTION 5:
What are the different roles that can be assigned to users in IAM??
a) Owner
b) Editor
c) Viewer
d) Checker

Correct Answer: (a), (b), and (c)


Detailed Solution: Viewer has read only access. Editor can deploy applications as well as modify
code. Owner can do all parts of the editor plus role management.

QUESTION 6:
What of the following are the available versions of SHA?
a) SHA-1
b) SHA-266
c) SHA-512
d) SHA-777

Correct Answer: (a), and (c)


Detailed Solution: SHA-1 has a 160-bit output and is considered to be no longer secure. SHA-512
has a 512-bit output and is considered to be very secure.

2
NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

QUESTION 7:
How does TLS encrypt data?
a) By using a symmetric encryption algorithm.
b) By using an asymmetric encryption algorithm.
c) By using a combination of symmetric and asymmetric encryption algorithms.
d) None of the above.

Correct Answer: (c)


Detailed Solution: TLS uses a combination of symmetric and asymmetric cryptography, as this
provides a good compromise between performance and security when transmitting data securely.

QUESTION 8:
Which of the following statements is true about APIs?
a) APIs are only used for web development.
b) APIs define the structure and behavior of a software system.
c) APIs can only be accessed by developers and programmers.
d) APIs are limited to communication between different programming languages

Correct Answer: (b)


Detailed Solution: APIs, or Application Programming Interfaces, are not limited to web
development but are used in various domains and industries. They define the interfaces through
which different software components or systems can interact with each other. APIs specify the
methods, protocols, and data formats that allow communication and interaction between different
software entities.

QUESTION 9:
What is the purpose of API keys in Cloud Endpoints?
a) To secure API endpoints against unauthorized access.
b) To generate dynamic documentation for the API.
c) To enable versioning and deployment of APIs.
d) To configure API traffic routing and load balancing.

Correct Answer: (a)


Detailed Solution: API keys in Cloud Endpoints serve the purpose of securing API endpoints against
unauthorized access, ensuring that only authorized clients with valid API keys can interact with the
APIs.

3
NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

QUESTION 10:
What is the role of Identity and Access Management (IAM) in authentication and authorization?
a) responsible for managing user roles and permissions.
b) ensures secure transmission of authentication data.
c) encrypts user credentials for secure storage.
d) audits and logs user activities for compliance purposes.

Correct Answer: (a)


Detailed Solution: IAM is a framework and set of practices that govern the management of
identities, roles, and access permissions within a system or organization. It provides a centralized
approach to managing user authentication and authorization.

You might also like