Introduce
As organizations move their data and applications to the cloud, they must address new security challenges. The Trust and Security with Google Cloud course explores the basics of cloud security, the value of Google Cloud's multilayered approach to infrastructure security, and how Google earns and maintains customer trust in the cloud.
Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
When you complete this course, you can earn the badge displayed here! View all the badges you have earned by visiting your profile page. Boost your cloud career by showing the world the skills you have developed!
Trust and Security in the Cloud
Which cloud security principle ensures that security practices and measures align with established standards and guidelines?
Confidentiality
Control
Compliance
Integrity
Which definition best describes a firewall?
A security model that assumes no user or device can be trusted by default
A set of security measures designed to protect a computer system or network from cyber attacks
A software program that encrypts data to make it unreadable to unauthorized users
A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules
Which cloud security principle relates to keeping data accurate and trustworthy?
Integrity
Control
Compliance
Confidentiality
Which cybersecurity threat demands a ransom payment from a victim to regain access to their files and systems.
Spyware
Trojan
Ransomware
Virus
Which cybersecurity threat occurs when errors arise during the setup of resources, inadvertently exposing sensitive data and systems to unauthorized access?
Configuration mishaps
Virus
Phishing
Malware
Which security principle advocates granting users only the access they need to perform their job responsibilities?
Privileged access
Least privilege
Zero-trust architecture
Security by default
Which is the responsibility of the cloud provider in a cloud security model?
Maintaining the customer's infrastructure.
Configuring the customer's applications.
Managing the customer's user access.
Securing the customer's data.
Which three essential aspects of cloud security form the foundation of the CIA triad?
Compliance, identity, and access management
Containers, infrastructure, and architecture
Certificates, intelligence, and authentication
Confidentiality, integrity, and availability
What common cybersecurity threat involves tricking users into revealing sensitive information or performing actions that compromise security?
Ransomware
Malware
Configuration mishap
Phishing
Which is a benefit of cloud security over traditional on-premises security?
Increased scalability.
Having physical access to hardware.
Only having to install security updates on a weekly basis.
Large upfront capital investment.
Google’s Trusted Infrastructure
What security feature adds an extra layer of protection to cloud-based systems?
Firewall as a service (FaaS)
Two-step verification (2SV)
Data loss prevention (DLP)
Security information and event management (SIEM)
What metric does Google Cloud use to measure the efficiency of its data centers to achieve cost savings and a reduced carbon footprint?
Energy Efficiency Ratio (EER)
Total cost of ownership (TCO)
Data Center Infrastructure Efficiency (DCiE)
Power Usage Effectiveness (PUE)
Google Cloud encrypts data at various states. Which state refers to when data is being actively processed by a computer?
Data lake
Data in use
Data at rest
Data in transit
Which practice involves a combination of processes and technologies that help reduce the risk of data breaches, system outages, and other security incidents in the cloud?
Cloud security posture management (CSPM)
Zero trust security
Security operations (SecOps)
Site reliability engineering (SRE)
Which is a powerful encryption algorithm trusted by governments and businesses worldwide?
Advanced Encryption Standard (AES)
Post-quantum cryptography (PQC)
Isomorphic encryption (IE)
Lattice-Based Cryptography (LBC)
Select the correct statement about Identity and Access Management (IAM).
IAM provides granular control over who has access to Google Cloud resources and what they can do with those resources.
IAM is a cloud service that encrypts cloud-based data at rest and in transit.
IAM is a system that detects and prevents malicious traffic from entering a cloud network.
IAM is a cloud security information and event management solution that collects and analyzes log data from cloud security devices and applications.
What Google Cloud product provides robust protection from harmful distributed denial-of-service (DDoS) attacks?
Google Cloud Armor
Cloud Monitoring
Cloud Load Balancing
IAM
Which aspect of cloud identity management verifies the identity of users or systems?
Authorization
Auditing
Authentication
Accounting
Google Cloud’s Trust Principles and Compliance
Which Google Cloud feature allows users to control their data's physical location?
Areas
Places
Districts
Regions
Which is one of Google Cloud’s seven trust principles?
All customer data is encrypted by default.
Google Cloud uses customer data for advertising.
Google sells customer data to third parties.
We give "backdoor" access to government entities when requested.
Which report provides a way for Google Cloud to share data about how the policies and actions of governments and corporations affect privacy, security, and access to information?
Compliance reports
Security reports
Billing reports
Transparency reports
Which term describes the concept that data is subject to the laws and regulations of the country where it resides?
Data consistency
Data sovereignty
Data redundancy
Data residency
Where can you find details about certifications and compliance standards met by Google Cloud?
Google Cloud console
Compliance resource center
Cloud Storage client libraries
Marketplace
