In this blog you will find the correct answer of the Coursera quiz Introduction to Cloud Identity Coursera All weeks Quiz mixsaver always try to brings best blogs and best coupon codes
Week- 1
Introductory Survey
1.
Question 1
How would you rate your confidence to succeed in online courses? (Select one)
1 point
- Very low
- Somewhat low
- Neutral
- Somewhat high
- Very high
2.
Question 2
An online course will require you to spend a lot of time… (Select one)
1 point
- Traveling to class
- Viewing introduction videos, going through in-product training, practicing through exercises, and interacting with others in the discussion forums.
- Sitting in class and listening to live lectures.
- Searching Google for the answers to the quizzes.
3.
Question 3
How would you rate your confidence to succeed in the field of information technology and/or system administration?
1 point
- Very low
- Somewhat low
- Neutral
- Somewhat high
- Very high
4.
Question 4
How important do you think system administration skills will be to your career?
1 point
- Very low
- Somewhat low
- Neutral
- Somewhat high
- Very high
User Lifecycle Management
1.
Question 1
What is the minimum information required to create a new user in your domain? (Select 3)
1 point
First name
Last name
Primary email address
Phone number
2.
Question 2
When adding multiple users to the CSV file, what is the minimum information required?
1 point
First name
Last name
Email address
Password
All of the above
3.
Question 3
Your organization just acquired a 100+ employee startup. You need to quickly create user accounts and add all of the new employees to your domain. Using the Admin console, which is the most efficient way to add new users all at once?
1 point
Add each new user manually.
Have each new user create their own accounts with the “Invite users” option.
Add all the new users at once from a .csv file.
Request the new users’ manager to add each new user manually.
4.
Question 4
Tim Lee has called you to reset his password, because he’s forgotten it and is now locked out of his account. What are the steps to reset his password in the Admin console?
1 point
Click the Users icon.
In the user list, click Tim Lee.
Click the Reset password icon.
Check the Require a change of password in the next sign in box.
Fill in a temporary password or click Auto-generate password.
Click the Users icon.
In the user list, click Tim Lee.
Fill in a temporary password or click Auto-generate password.
Click the Reset password icon.
Check the Require a change of password in the next sign in box.
Click the Users icon.
In the user list, click Tim Lee.
Check the Require a change of password in the next sign in box.
Fill in a temporary password or click Auto-generate password.
Click the Reset password icon.
Click the Users icon.
In the user list, click Tim Lee.
Click the Reset password icon.
Fill in a temporary password or click Auto-generate password.
Check the Require a change of password in the next sign in box.
5.
Question 5
What happens when you suspend a user’s account? (Select 3)
1 point
Temporarily blocks a user’s access to your organization’s cloud services
Disables the account without deleting the user’s profile and related information
Deletes the user’s profile and related information
The user can’t sign in to the account
6.
Question 6
What happens when you delete a Cloud Identity user’s account? (Select 3)
1 point
Temporarily blocks a user’s access to your organization’s cloud services.
Admins can no longer manage that user or access their data from the Google Admin console.
The user can’t access any of your organization’s G Suite services, such as Google Drive files or Gmail.
All data for that user is deleted.
7.
Question 7
The IT manager at your organization wants to know how Google Cloud Directory Sync (GCDS) works. Select the order that best describes how GCDS works.
1 point
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
Data is exported in a list from your LDAP server or Active Directory.
GCDS compares these lists and updates your Google domain to match the data.
Data is exported in a list from your LDAP server or Active Directory.
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
GCDS compares these lists and updates your Google domain to match the data.
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
GCDS compares these lists and updates your Google domain to match the data.
Data is exported in a list from your LDAP server or Active Directory.
Data is exported in a list from your LDAP server or Active Directory.
GCDS compares these lists and updates your Google domain to match the data.
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
8.
Question 8
What actions can only a super administrator perform? (Select 3)
1 point
Create new groups
Create or assign administrator roles
Set up billing
Restore deleted users
9.
Question 9
What’s the recommended way to create a custom administrator role for your domain?
1 point
Create a new role and edit the privileges
Duplicate an existing role and edit the privileges.
Create a new role based on a role template.
Choose custom administrator option when manually adding the user.
10.
Question 10
When assigning an administrative role to a single user, where in the user’s account page do you assign the role?
1 point
Groups
License
Admin roles and privileges
Security
11.
Question 11
You are meeting with your IT manager to explain the reasons for creating an organizational structure within your Cloud Identity domain. What are some of the reasons you would say? (Select 3)
1 point
You can control which applications and services are available to our users.
You can configure the different available services for each set of users.
Having multiple domains, you won’t be able to mix and match users from all of our domains into an organizational unit.
You can configure different Chrome OS device settings for different sets of devices.
12.
Question 12
What are some of the essential guidelines and tips for creating multiple accounts? (Select 3)
1 point
Format your file as a table and include headers to define each field.
Upload large CSV files.
If you include an existing username in your file, the user’s password, and first and last name will be updated.
Split your table into smaller chunks before saving each one as a CSV file.
Security
1.
Question 1
What are some best practices for reinforcing and monitoring the security of your Cloud Identity domain? Select all that apply.
1 point
View user account activity reports
Ensure your domain is setup correctly
View and manage your users’ security settings
Set up 2-step verification
2.
Question 2
The IT manager at your organization wants to know the advantages of using 2-Step Verification for your organization. What should you say? Select all that apply.
1 point
It’ll greatly reduce the risk of unauthorized access if a user’s password is compromised.
We wouldn’t have to manage individual user IDs and passwords for each user.
It would be a great opportunity to make sure everyone is the organization has a security key.
It’ll reinforce our domain’s password security by requiring our users to enter an additional code.
3.
Question 3
Where do you go to enable 2-Step Verification for your domain to ensure it’s available for your users?
1 point
Security > Password monitoring
Users > [User’s Name] > Security
Reports > Security
Security > Basic settings
4.
Question 4
The IT manager at your organization hasn’t had a chance to explore the Admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? Select all that apply.
1 point
Examine a user’s password strength
Determine if the user has 2-Step Verification set up
Review a user’s administrative access
Temporarily disable the user’s Login Challenge for 10 minutes
5.
Question 5
What data can you view in the Account activity report for users? Select all that apply.
1 point
User Account Status
Admin Status
2-Step Verification Enrollment
Managed devices
6.
Question 6
Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the Admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?
1 point
Apps > SAML apps > plus sign (+) > Select Setup My Own Custom App from the Enable SSO for SAML Application window
Security > Set up single sign-on (SSO) > Check the Setup SSO with third party identity provider box and provide the necessary information
Apps > SAML apps > plus sign (+) > Select Asana from the Enable SSO for SAML Application window
Security > Basic Settings > Under Two-step verification, click on Go to advanced setting to enforce 2-step verification
7.
Question 7
Where do you go to manage your users’ password strength?
1 point
Security > Password monitoring
Security > Password management
Users > [User’s Name] > Account
Reports > Security
8.
Question 8
Your organization has decided to enforce 2-Step Verification in 2 weeks. What actions should you keep in mind when enforcing 2-Step Verification? Select all that apply.
1 point
You’ll need to provide a lead time for users to enroll in 2-Step Verification before enforcement.
You’ll want to confirm that all of your users are enrolled in 2-Step Verification before enforcement.
When you create new user accounts after enforcement, you will need to place these users into an exception group so they can access their account and enroll in 2-Step Verification.
Enforcing 2-Step Verification will not affect your users whether they are enrolled in 2-Step Verification or not.
9.
Question 9
Where in the Admin console do you go to enable API access that allows access to various Admin SDK APIs?
1 point
Security > Advanced settings
Security > API Permissions
Security > Basic settings
Security > API reference
10.
Question 10
What are some of the best ways you can protect your users against phishing attacks? Select all that apply.
1 point
Assign appropriate administrator roles
Verify a user’s identity with a Login Challenge
Set up 2-Step Verification
Deploy the Password Alert extension
Google Mobile Management
1.
Question 1
What icon do you click on the Admin Console dashboard in order to access the Google Mobile Management toolset?
1 point
Company profile
Apps
Groups
Device Management
2.
Question 2
In order to to enable Mobile Management for your domain, what click-path do you follow?
1 point
Device Management >> Setup >> Mobile Management >> Toggle Enabled
Apps >> Setup >> Mobile Management >> Toggle Enabled
Groups >> Enable Mobile Management
Device Management >> Android Settings >> General Settings >> Application Auditing
3.
Question 3
Which of the following Google Mobile Management feature sets are only available in advanced management? Select all that apply.
1 point
Secure devices with a screen lock
Restrict access to device settings and features
Monitor compliance with policies you set
Remote account wipe
4.
Question 4
An end user in your organization has lost their device, based on this training, what would be your next step?
1 point
Ask the user where they think they lost the device, and wait for them to find it.
Immediately get your user a new mobile device.
Wipe the user’s device.
Suspend the user.
5.
Question 5
Once users have signed into their personal devices with their new Google Accounts, where will you see these devices?
1 point
The users will be able to sign in, and then you won’t be able see them in the admin console.
You will see them in the Mobile Devices dashboard.
The users’ devices will show up in the in Android Settings feature page.
Domains and Reports
1.
Question 1
What information can you find on the Highlights report page? Select all that apply.
1 point
Users not enrolled in 2 step verification
Users allowed access to less secure apps
Changes made to group memberships
External apps installed
2.
Question 2
Your IT manager would like to know the total admins in your organization, which report can you generate to find this information?
1 point
Security reports
Highlights report
Account activity reports
Aggregate reports
3.
Question 3
After rolling out security keys as part of your organization’s 2-step verification initiative, your IT manager would like to know which users have enrolled their security keys. Which report can you generate to find this information?
1 point
Account activity reports
Security reports
Highlights report
Aggregate reports
4.
Question 4
Your IT manager would like to know which users are using third-party web applications in your domain, which audit can you generate to find this information?
1 point
Admin audit log
Groups audit log
OAuth Token audit log
SAML audit log
5.
Question 5
Which audit log shows a history of every task performed in your Google Admin console and who performed the task?
1 point
Admin audit log
OAuth Token audit log
SAML audit log
Groups audit log
6.
Question 6
What data can you track using the Login audit log? Select all that apply.
1 point
Each time a user has an invalid service provider ID
Each time a user fails to log in
Each time a user logged out
Each time a user logged in and there were some unusual characteristics
7.
Question 7
Once you opened a report or audit log, what additional actions can you take? Select all that apply.
1 point
You can customize the report or audit log by filtering the data by user or activity.
You can download and export your report or audit log data to a CSV file.
You can change the data you see in the report or audit log by clicking on the down arrow next to the title above the chart.
You can change the data you see in the report or audit log by or clicking on the Select Columns button to change the view of the available columns.
8.
Question 8
How do you turn on or off administrator email alerts?
1 point
Reports > Manage alerts > click on settings
Reports > Manage alerts > toggle switch on or off in the Status column
Reports > Manage alerts > click on the predefined alert to edit
Reports > Admin > Filters > Set Alert
9.
Question 9
What type of email administrator email alerts can you receive? Select all that apply.
1 point
Your own custom alerts based on your organization audit logs like Admin, Login or Tokens for example.
2-Step Verification and when a user enrolls in 2 Step-Verification or a security key.
Mobile device activity alerts like device compromise update or suspicious mobile activity for example.
User activity alerts like when a user is added or deleted, granted Admin privileges or suspended for example.
10.
Question 10
Your organization recently purchased some new domains and would like to add them to your Cloud Identity account. Your IT manager isn’t sure whether to add your domain as a domain alias or as an additional domain and has asked you to clarify the difference between each. How would you describe the difference between each?
1 point
When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.
When you add the domain as a domain alias, each user will have a new Cloud Identity account created for them and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.
Important Links:
- Advanced Algorithms and Complexity Coursera Week 1 Quiz
- Business Analytics for Decision Making Coursera Week 1 Quiz
- Epidemiology: Successful Career Development Coursera Week 1
- How Things Work: An Introduction to Physics week 1
- Introduction to Public Speaking Coursera week 1 Quiz