NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Google Cloud Computing Foundations
(Jul-Oct 2023)
Assignment- Week 4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1:
Google Endpoint APIs can be authenticated using:
a) JSON web tokens
b) Passwords
c) Firebase auth
d) API keys
Correct Answer: (a), (c), and (d)
Detailed Solution: Google Endpoint API can be authenticated using JSON web tokens, Firebase
auth, API keys but not with the help of passwords
QUESTION 2:
Which of the following is/are applicable for Cloud Pub/Sub?
a) it is a software application that collects data from user
b) it exchange data directly between publisher and subscriber
c) it can not handle multiple applications
d) none of the above
Correct Answer: (d)
Detailed Solution: Cloud Pub/Sub is a middleware, exchange data through message stores, and can
act as a buffer between multiple applications.
QUESTION 3:
In the GCP shared security model, the security of identity in PaaS is managed by Google.
Please mention whether the above statement is true/false.
a) True
b) False
Correct Answer: (a)
1
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Detailed Solution: The security of identity in SaaS and PasS is managed by Google but it is
managed the customer/user in case of IaaS.
QUESTION 4:
What are some of the limitations of using cloud storage for buckets and objects?
a) Data sovereignty.
b) Performance.
c) Compliance.
d) Access control.
Correct Answer: (a) and (b)
Detailed Solution: Cloud storage providers may not be located in the same country as the data
owner, which can raise data sovereignty concerns. Cloud storage can have slower performance than
on-premises storage.
QUESTION 5:
What are the different roles that can be assigned to users in IAM??
a) Owner
b) Editor
c) Viewer
d) Checker
Correct Answer: (a), (b), and (c)
Detailed Solution: Viewer has read only access. Editor can deploy applications as well as modify
code. Owner can do all parts of the editor plus role management.
QUESTION 6:
What of the following are the available versions of SHA?
a) SHA-1
b) SHA-266
c) SHA-512
d) SHA-777
Correct Answer: (a), and (c)
Detailed Solution: SHA-1 has a 160-bit output and is considered to be no longer secure. SHA-512
has a 512-bit output and is considered to be very secure.
2
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 7:
How does TLS encrypt data?
a) By using a symmetric encryption algorithm.
b) By using an asymmetric encryption algorithm.
c) By using a combination of symmetric and asymmetric encryption algorithms.
d) None of the above.
Correct Answer: (c)
Detailed Solution: TLS uses a combination of symmetric and asymmetric cryptography, as this
provides a good compromise between performance and security when transmitting data securely.
QUESTION 8:
Which of the following statements is true about APIs?
a) APIs are only used for web development.
b) APIs define the structure and behavior of a software system.
c) APIs can only be accessed by developers and programmers.
d) APIs are limited to communication between different programming languages
Correct Answer: (b)
Detailed Solution: APIs, or Application Programming Interfaces, are not limited to web
development but are used in various domains and industries. They define the interfaces through
which different software components or systems can interact with each other. APIs specify the
methods, protocols, and data formats that allow communication and interaction between different
software entities.
QUESTION 9:
What is the purpose of API keys in Cloud Endpoints?
a) To secure API endpoints against unauthorized access.
b) To generate dynamic documentation for the API.
c) To enable versioning and deployment of APIs.
d) To configure API traffic routing and load balancing.
Correct Answer: (a)
Detailed Solution: API keys in Cloud Endpoints serve the purpose of securing API endpoints against
unauthorized access, ensuring that only authorized clients with valid API keys can interact with the
APIs.
3
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 10:
What is the role of Identity and Access Management (IAM) in authentication and authorization?
a) responsible for managing user roles and permissions.
b) ensures secure transmission of authentication data.
c) encrypts user credentials for secure storage.
d) audits and logs user activities for compliance purposes.
Correct Answer: (a)
Detailed Solution: IAM is a framework and set of practices that govern the management of
identities, roles, and access permissions within a system or organization. It provides a centralized
approach to managing user authentication and authorization.