Coursera Introduction to Cloud Identity – quiz answers

Coursera Introduction to Cloud Identity – quiz answers:

  • Getting Started with Cloud Identity
  • User Lifecycle Management
  • Security
  • Device Management
  • Domains and Reports
  • Summary, Use Case Example, & Resources

You may also be interested in Google Data Analytics Professional Certificate Course 1: Foundations – Cliffs Notes.


Coursera Introduction to Cloud Identity quiz answers

Getting Started with Cloud Identity

Question 1. How would you rate your confidence to succeed in online courses? (Select one)

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high

Question 2. An online course will require you to spend a lot of time… (Select one)

  • Traveling to class
  • Viewing introduction videos, going through in-product training, practicing through exercises, and interacting with others in the discussion forums.
  • Sitting in class and listening to live lectures.
  • Searching Google for the answers to the quizzes.

Question 3. How would you rate your confidence to succeed in the field of information technology and/or system administration?

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high

Question 4. How important do you think system administration skills will be to your career?

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high

User Lifecycle Management

Question 1. What is the minimum information required to create a new user in your domain? (Select 3)

  • First name
  • Last name
  • Primary email address
  • Phone number

Question 2. When adding multiple users to the CSV file, what is the minimum information required?

  • First name
  • Last name
  • Email address
  • Password
  • All of the above

Question 3. Your organization just acquired a 100+ employee startup. You need to quickly create user accounts and add all of the new employees to your domain. Using the Admin console, which is the most efficient way to add new users all at once?

  • Add each new user manually.
  • Have each new user create their own accounts with the “Invite users” option.
  • Add all the new users at once from a .csv file.
  • Request the new users’ manager to add each new user manually.

Question 4. Tim Lee has called you to reset his password, because he’s forgotten it and is now locked out of his account. What are the steps to reset his password in the Admin console?

  • Click the Users icon.
    In the user list, click Tim Lee.
    Click the Reset password icon.
    Check the Require a change of password in the next sign in box.
    Fill in a temporary password or click Auto-generate password.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Fill in a temporary password or click Auto-generate password.
    Click the Reset password icon.
    Check the Require a change of password in the next sign in box.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Check the Require a change of password in the next sign in box.
    Fill in a temporary password or click Auto-generate password.
    Click the Reset password icon.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Click the Reset password icon.
    Fill in a temporary password or click Auto-generate password.
    Check the Require a change of password in the next sign in box.

Question 5. What happens when you suspend a user’s account? (Select 3)

  • Temporarily blocks a user’s access to your organization’s cloud services
  • Disables the account without deleting the user’s profile and related information
  • Deletes the user’s profile and related information
  • The user can’t sign in to the account

Question 6. What happens when you delete a Cloud Identity user’s account? (Select 3)

  • Temporarily blocks a user’s access to your organization’s cloud services.
  • Admins can no longer manage that user or access their data from the Google Admin console.
  • The user can’t access any of your organization’s G Suite services, such as Google Drive files or Gmail.
  • All data for that user is deleted.

Question 7. The IT manager at your organization wants to know how Google Cloud Directory Sync (GCDS) works. Select the order that best describes how GCDS works.

  • GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    Data is exported in a list from your LDAP server or Active Directory.
    GCDS compares these lists and updates your Google domain to match the data.
  • Data is exported in a list from your LDAP server or Active Directory.
    GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    GCDS compares these lists and updates your Google domain to match the data.
  • GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    GCDS compares these lists and updates your Google domain to match the data.
    Data is exported in a list from your LDAP server or Active Directory.
  • Data is exported in a list from your LDAP server or Active Directory.
    GCDS compares these lists and updates your Google domain to match the data.
    GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.

Question 8. What actions can only a super administrator perform? (Select 3)

  • Create new groups
  • Create or assign administrator roles
  • Set up billing
  • Restore deleted users

Question 9. What’s the recommended way to create a custom administrator role for your domain?

  • Create a new role and edit the privileges
  • Duplicate an existing role and edit the privileges.
  • Create a new role based on a role template.
  • Choose custom administrator option when manually adding the user.

Question 10. When assigning an administrative role to a single user, where in the user’s account page do you assign the role?

  • Groups
  • License
  • Admin roles and privileges
  • Security

Question 11. You are meeting with your IT manager to explain the reasons for creating an organizational structure within your Cloud Identity domain. What are some of the reasons you would say? (Select 3)

  • You can control which applications and services are available to our users.
  • You can configure the different available services for each set of users.
  • Having multiple domains, you won’t be able to mix and match users from all of our domains into an organizational unit.
  • You can configure different Chrome OS device settings for different sets of devices.

Question 12. What are some of the essential guidelines and tips for creating multiple accounts? (Select 3)

  • Format your file as a table and include headers to define each field.
  • Upload large CSV files.
  • If you include an existing username in your file, the user’s password, and first and last name will be updated.
  • Split your table into smaller chunks before saving each one as a CSV file.

Security

Question 1. What are some best practices for reinforcing and monitoring the security of your Cloud Identity domain? Select all that apply.

  • View user account activity reports
  • Ensure your domain is setup correctly
  • View and manage your users’ security settings
  • Set up 2-step verification

Question 2. The IT manager at your organization wants to know the advantages of using 2-Step Verification for your organization. What should you say? Select all that apply.

  • It’ll greatly reduce the risk of unauthorized access if a user’s password is compromised.
  • We wouldn’t have to manage individual user IDs and passwords for each user.
  • It would be a great opportunity to make sure everyone is the organization has a security key.
  • It’ll reinforce our domain’s password security by requiring our users to enter an additional code.

Question 3. Where do you go to enable 2-Step Verification for your domain to ensure it’s available for your users?

  • Security > Password monitoring
  • Users > [User’s Name] > Security
  • Reports > Security
  • Security > Basic settings

Question 4. The IT manager at your organization hasn’t had a chance to explore the Admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? Select all that apply.

  • Examine a user’s password strength
  • Determine if the user has 2-Step Verification set up
  • Review a user’s administrative access
  • Temporarily disable the user’s Login Challenge for 10 minutes

Question 5. What data can you view in the Account activity report for users? Select all that apply.

  • User Account Status
  • Admin Status
  • 2-Step Verification Enrollment
  • Managed devices

Question 6. Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the Admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?

  • Apps > SAML apps > plus sign (+) > Select Setup My Own Custom App from the Enable SSO for SAML Application window
  • Security > Set up single sign-on (SSO) > Check the Setup SSO with third party identity provider box and provide the necessary information
  • Apps > SAML apps > plus sign (+) > Select Asana from the Enable SSO for SAML Application window
  • Security > Basic Settings > Under Two-step verification, click on Go to advanced setting to enforce 2-step verification

Question 7. Where do you go to manage your users’ password strength?

  • Security > Password monitoring
  • Security > Password management
  • Users > [User’s Name] > Account
  • Reports > Security

Question 8. Your organization has decided to enforce 2-Step Verification in 2 weeks. What actions should you keep in mind when enforcing 2-Step Verification? Select all that apply.

  • You’ll need to provide a lead time for users to enroll in 2-Step Verification before enforcement.
  • You’ll want to confirm that all of your users are enrolled in 2-Step Verification before enforcement.
  • When you create new user accounts after enforcement, you will need to place these users into an exception group so they can access their account and enroll in 2-Step Verification.
  • Enforcing 2-Step Verification will not affect your users whether they are enrolled in 2-Step Verification or not.

Question 9. Where in the Admin console do you go to enable API access that allows access to various Admin SDK APIs?

  • Security > Advanced settings
  • Security > API Permissions
  • Security > Basic settings
  • Security > API reference

Question 10. What are some of the best ways you can protect your users against phishing attacks? Select all that apply.

  • Assign appropriate administrator roles
  • Verify a user’s identity with a Login Challenge
  • Set up 2-Step Verification
  • Deploy the Password Alert extension

Device Management

Question 1. What icon do you click on the Admin Console dashboard in order to access the Google Mobile Management toolset?

  • Company profile
  • Apps
  • Groups
  • Device Management

Question 2. In order to to enable Mobile Management for your domain, what click-path do you follow?

  • Device Management > Setup > Mobile Management > Toggle Enabled
  • Apps > Setup > Mobile Management > Toggle Enabled
  • Groups > Enable Mobile Management
  • Device Management > Android Settings > General Settings > Application Auditing

Question 3. Which of the following Google Mobile Management feature sets are only available in advanced management? Select all that apply.

  • Secure devices with a screen lock
  • Restrict access to device settings and features
  • Monitor compliance with policies you set
  • Remote account wipe

Question 4. An end user in your organization has lost their device, based on this training, what would be your next step?

  • Ask the user where they think they lost the device, and wait for them to find it.
  • Immediately get your user a new mobile device.
  • Wipe the user’s device.
  • Suspend the user.

Question 5. Once users have signed into their personal devices with their new Google Accounts, where will you see these devices?

  • The users will be able to sign in, and then you won’t be able see them in the admin console.
  • You will see them in the Mobile Devices dashboard.
  • The users’ devices will show up in the in Android Settings feature page.

Domains and Reports

Question 1. What information can you find on the Highlights report page? Select all that apply.

  • Users not enrolled in 2 step verification
  • Users allowed access to less secure apps
  • Changes made to group memberships
  • External apps installed

Question 2. Your IT manager would like to know the total admins in your organization, which report can you generate to find this information?

  • Security reports
  • Highlights report
  • Account activity reports
  • Aggregate reports

Question 3. After rolling out security keys as part of your organization’s 2-step verification initiative, your IT manager would like to know which users have enrolled their security keys. Which report can you generate to find this information?

  • Account activity reports
  • Security reports
  • Highlights report
  • Aggregate reports

Question 4. Your IT manager would like to know which users are using third-party web applications in your domain, which audit can you generate to find this information?

  • Admin audit log
  • Groups audit log
  • OAuth Token audit log
  • SAML audit log

Question 5. Which audit log shows a history of every task performed in your Google Admin console and who performed the task?

  • Admin audit log
  • OAuth Token audit log
  • SAML audit log
  • Groups audit log

Question 6. What data can you track using the Login audit log? Select all that apply.

  • Each time a user has an invalid service provider ID
  • Each time a user fails to log in
  • Each time a user logged out
  • Each time a user logged in and there were some unusual characteristics

Question 7. Once you opened a report or audit log, what additional actions can you take? Select all that apply.

  • You can customize the report or audit log by filtering the data by user or activity.
  • You can download and export your report or audit log data to a CSV file.
  • You can change the data you see in the report or audit log by clicking on the down arrow next to the title above the chart.
  • You can change the data you see in the report or audit log by or clicking on the Select Columns button to change the view of the available columns.

Question 8. How do you turn on or off administrator email alerts?

  • Reports > Manage alerts > click on settings
  • Reports > Manage alerts > toggle switch on or off in the Status column
  • Reports > Manage alerts > click on the predefined alert to edit
  • Reports > Admin > Filters > Set Alert

Question 9. What type of email administrator email alerts can you receive? Select all that apply.

  • Your own custom alerts based on your organization audit logs like Admin, Login or Tokens for example.
  • 2-Step Verification and when a user enrolls in 2 Step-Verification or a security key.
  • Mobile device activity alerts like device compromise update or suspicious mobile activity for example.
  • User activity alerts like when a user is added or deleted, granted Admin privileges or suspended for example.

Question 10. Your organization recently purchased some new domains and would like to add them to your Cloud Identity account. Your IT manager isn’t sure whether to add your domain as a domain alias or as an additional domain and has asked you to clarify the difference between each. How would you describe the difference between each?

  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.
  • When you add the domain as a domain alias, each user will have a new Cloud Identity account created for them and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.

Related content

How to get CCNA certification

IT career paths – everything you need to know

Network security risk mitigation best practices

Professional ethical hacking body of knowledge

The GRC approach to managing cybersecurity

The penetration testing process

What do ethical hackers do?

Back to DTI Courses

Text copying is disabled!