info@avatto.com
+91-9920808017
81. What service is used to supply encryption keys when users want to manage their own keys?
CloudHSM
Cloud Key Management System
Google is encrypted by default. No keys are required
The customer must bring their own keys and mange them.
Your email address will not be published. Required fields are marked *
Report
Name
Email
Website
Save my name, email, and website in this browser for the next time I comment.
Comment
82. True or False. Cloud Identity-Aware Proxy (Cloud IAP) allows you to use an application-level access control model instead of relying on network-level firewalls.
True
False
83. There are a number of best practices that should be applied to identity and access management. Which of the following does Google recommend?
Use folders to group instances
Use custom roles for all objects
Try to use primitive roles instead of pre-defined roles
Use the "Principle of least privilege" when distributing permissions
84. Virtual private cloud networks (VPCs) allow the deployment of infrastructure as a service resources, such as compute instances and containers. Which of these statements best describes a VPC?
A VPN connection
Virtual network adapters used for virtual machines
A software-defined network built on top of Google's network
A dedicated link from Google Cloud Platform to a customer's network
85. True or False. 'Regional' is a type of virtual private cloud (VPCs)
Login with Facebook
Login with Google
Forgot your password?
Lost your password? Please enter your email address. You will receive mail with link to set new password.
Back to login