Introduction to Cloud Identity Coursera All weeks Quiz

In this blog you will find the correct answer of the Coursera quiz Introduction to Cloud Identity Coursera All weeks Quiz mixsaver always try to brings best blogs and best coupon codes
 

 

Week- 1

Introductory Survey

 

1.
Question 1
How would you rate your confidence to succeed in online courses? (Select one)

1 point

2.
Question 2
An online course will require you to spend a lot of time… (Select one)

1 point

3.
Question 3
How would you rate your confidence to succeed in the field of information technology and/or system administration?

1 point

4.
Question 4
How important do you think system administration skills will be to your career?

1 point

 

 

User Lifecycle Management

 

1.
Question 1
What is the minimum information required to create a new user in your domain? (Select 3)

1 point

First name

Last name

Primary email address

Phone number

2.
Question 2
When adding multiple users to the CSV file, what is the minimum information required?

1 point

First name

Last name

Email address

Password

All of the above

3.
Question 3
Your organization just acquired a 100+ employee startup. You need to quickly create user accounts and add all of the new employees to your domain. Using the Admin console, which is the most efficient way to add new users all at once?

1 point

Add each new user manually.

Have each new user create their own accounts with the “Invite users” option.

Add all the new users at once from a .csv file.

Request the new users’ manager to add each new user manually.

4.
Question 4
Tim Lee has called you to reset his password, because he’s forgotten it and is now locked out of his account. What are the steps to reset his password in the Admin console?

1 point

Click the Users icon.
In the user list, click Tim Lee.
Click the Reset password icon.
Check the Require a change of password in the next sign in box.
Fill in a temporary password or click Auto-generate password.

Click the Users icon.
In the user list, click Tim Lee.
Fill in a temporary password or click Auto-generate password.
Click the Reset password icon.
Check the Require a change of password in the next sign in box.

Click the Users icon.
In the user list, click Tim Lee.
Check the Require a change of password in the next sign in box.
Fill in a temporary password or click Auto-generate password.
Click the Reset password icon.

Click the Users icon.
In the user list, click Tim Lee.
Click the Reset password icon.
Fill in a temporary password or click Auto-generate password.
Check the Require a change of password in the next sign in box.
5.
Question 5
What happens when you suspend a user’s account? (Select 3)

1 point

Temporarily blocks a user’s access to your organization’s cloud services

Disables the account without deleting the user’s profile and related information

Deletes the user’s profile and related information

The user can’t sign in to the account

6.
Question 6
What happens when you delete a Cloud Identity user’s account? (Select 3)

1 point

Temporarily blocks a user’s access to your organization’s cloud services.

Admins can no longer manage that user or access their data from the Google Admin console.

The user can’t access any of your organization’s G Suite services, such as Google Drive files or Gmail.

All data for that user is deleted.

7.
Question 7
The IT manager at your organization wants to know how Google Cloud Directory Sync (GCDS) works. Select the order that best describes how GCDS works.

1 point

GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
Data is exported in a list from your LDAP server or Active Directory.
GCDS compares these lists and updates your Google domain to match the data.

Data is exported in a list from your LDAP server or Active Directory.
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
GCDS compares these lists and updates your Google domain to match the data.

GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
GCDS compares these lists and updates your Google domain to match the data.
Data is exported in a list from your LDAP server or Active Directory.

Data is exported in a list from your LDAP server or Active Directory.
GCDS compares these lists and updates your Google domain to match the data.
GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.

8.
Question 8
What actions can only a super administrator perform? (Select 3)

1 point

Create new groups

Create or assign administrator roles

Set up billing

Restore deleted users

9.
Question 9
What’s the recommended way to create a custom administrator role for your domain?

1 point

Create a new role and edit the privileges

Duplicate an existing role and edit the privileges.

Create a new role based on a role template.

Choose custom administrator option when manually adding the user.

10.
Question 10
When assigning an administrative role to a single user, where in the user’s account page do you assign the role?

1 point

Groups

License

Admin roles and privileges

Security

11.
Question 11
You are meeting with your IT manager to explain the reasons for creating an organizational structure within your Cloud Identity domain. What are some of the reasons you would say? (Select 3)

1 point

You can control which applications and services are available to our users.

You can configure the different available services for each set of users.

Having multiple domains, you won’t be able to mix and match users from all of our domains into an organizational unit.

You can configure different Chrome OS device settings for different sets of devices.

12.
Question 12
What are some of the essential guidelines and tips for creating multiple accounts? (Select 3)

1 point

Format your file as a table and include headers to define each field.

Upload large CSV files.

If you include an existing username in your file, the user’s password, and first and last name will be updated.

Split your table into smaller chunks before saving each one as a CSV file.

 

 

 

Security

 

1.
Question 1
What are some best practices for reinforcing and monitoring the security of your Cloud Identity domain? Select all that apply.

1 point

View user account activity reports

Ensure your domain is setup correctly

View and manage your users’ security settings

Set up 2-step verification

2.
Question 2
The IT manager at your organization wants to know the advantages of using 2-Step Verification for your organization. What should you say? Select all that apply.

1 point

It’ll greatly reduce the risk of unauthorized access if a user’s password is compromised.

We wouldn’t have to manage individual user IDs and passwords for each user.

It would be a great opportunity to make sure everyone is the organization has a security key.

It’ll reinforce our domain’s password security by requiring our users to enter an additional code.

3.
Question 3
Where do you go to enable 2-Step Verification for your domain to ensure it’s available for your users?

1 point

Security > Password monitoring

Users > [User’s Name] > Security

Reports > Security

Security > Basic settings

4.
Question 4
The IT manager at your organization hasn’t had a chance to explore the Admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? Select all that apply.

1 point

Examine a user’s password strength

Determine if the user has 2-Step Verification set up

Review a user’s administrative access

Temporarily disable the user’s Login Challenge for 10 minutes

5.
Question 5
What data can you view in the Account activity report for users? Select all that apply.

1 point

User Account Status

Admin Status

2-Step Verification Enrollment

Managed devices

6.
Question 6
Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the Admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?

1 point

Apps > SAML apps > plus sign (+) > Select Setup My Own Custom App from the Enable SSO for SAML Application window

Security > Set up single sign-on (SSO) > Check the Setup SSO with third party identity provider box and provide the necessary information

Apps > SAML apps > plus sign (+) > Select Asana from the Enable SSO for SAML Application window

Security > Basic Settings > Under Two-step verification, click on Go to advanced setting to enforce 2-step verification

7.
Question 7
Where do you go to manage your users’ password strength?

1 point

Security > Password monitoring

Security > Password management

Users > [User’s Name] > Account

Reports > Security

8.
Question 8
Your organization has decided to enforce 2-Step Verification in 2 weeks. What actions should you keep in mind when enforcing 2-Step Verification? Select all that apply.

1 point

You’ll need to provide a lead time for users to enroll in 2-Step Verification before enforcement.

You’ll want to confirm that all of your users are enrolled in 2-Step Verification before enforcement.

When you create new user accounts after enforcement, you will need to place these users into an exception group so they can access their account and enroll in 2-Step Verification.

Enforcing 2-Step Verification will not affect your users whether they are enrolled in 2-Step Verification or not.

9.
Question 9
Where in the Admin console do you go to enable API access that allows access to various Admin SDK APIs?

1 point

Security > Advanced settings

Security > API Permissions

Security > Basic settings

Security > API reference

10.
Question 10
What are some of the best ways you can protect your users against phishing attacks? Select all that apply.

1 point

Assign appropriate administrator roles

Verify a user’s identity with a Login Challenge

Set up 2-Step Verification

Deploy the Password Alert extension

 

Google Mobile Management

 

1.
Question 1
What icon do you click on the Admin Console dashboard in order to access the Google Mobile Management toolset?

1 point

Company profile

Apps

Groups

Device Management

2.
Question 2
In order to to enable Mobile Management for your domain, what click-path do you follow?

1 point

Device Management >> Setup >> Mobile Management >> Toggle Enabled

Apps >> Setup >> Mobile Management >> Toggle Enabled

Groups >> Enable Mobile Management

Device Management >> Android Settings >> General Settings >> Application Auditing

3.
Question 3
Which of the following Google Mobile Management feature sets are only available in advanced management? Select all that apply.

1 point

Secure devices with a screen lock

Restrict access to device settings and features

Monitor compliance with policies you set

Remote account wipe

4.
Question 4
An end user in your organization has lost their device, based on this training, what would be your next step?

1 point

Ask the user where they think they lost the device, and wait for them to find it.

Immediately get your user a new mobile device.

Wipe the user’s device.

Suspend the user.

5.
Question 5
Once users have signed into their personal devices with their new Google Accounts, where will you see these devices?

1 point

The users will be able to sign in, and then you won’t be able see them in the admin console.

You will see them in the Mobile Devices dashboard.

The users’ devices will show up in the in Android Settings feature page.

 

 

 

 

Domains and Reports

1.
Question 1
What information can you find on the Highlights report page? Select all that apply.

1 point

Users not enrolled in 2 step verification

Users allowed access to less secure apps

Changes made to group memberships

External apps installed

2.
Question 2
Your IT manager would like to know the total admins in your organization, which report can you generate to find this information?

1 point

Security reports

Highlights report

Account activity reports

Aggregate reports

3.
Question 3
After rolling out security keys as part of your organization’s 2-step verification initiative, your IT manager would like to know which users have enrolled their security keys. Which report can you generate to find this information?

1 point

Account activity reports

Security reports

Highlights report

Aggregate reports

4.
Question 4
Your IT manager would like to know which users are using third-party web applications in your domain, which audit can you generate to find this information?

1 point

Admin audit log

Groups audit log

OAuth Token audit log

SAML audit log

5.
Question 5
Which audit log shows a history of every task performed in your Google Admin console and who performed the task?

1 point

Admin audit log

OAuth Token audit log

SAML audit log

Groups audit log

6.
Question 6
What data can you track using the Login audit log? Select all that apply.

1 point

Each time a user has an invalid service provider ID

Each time a user fails to log in

Each time a user logged out

Each time a user logged in and there were some unusual characteristics

7.
Question 7
Once you opened a report or audit log, what additional actions can you take? Select all that apply.

1 point

You can customize the report or audit log by filtering the data by user or activity.

You can download and export your report or audit log data to a CSV file.

You can change the data you see in the report or audit log by clicking on the down arrow next to the title above the chart.

You can change the data you see in the report or audit log by or clicking on the Select Columns button to change the view of the available columns.

 

8.
Question 8
How do you turn on or off administrator email alerts?

1 point

Reports > Manage alerts > click on settings

Reports > Manage alerts > toggle switch on or off in the Status column

Reports > Manage alerts > click on the predefined alert to edit

Reports > Admin > Filters > Set Alert

9.
Question 9
What type of email administrator email alerts can you receive? Select all that apply.

1 point

Your own custom alerts based on your organization audit logs like Admin, Login or Tokens for example.

2-Step Verification and when a user enrolls in 2 Step-Verification or a security key.

Mobile device activity alerts like device compromise update or suspicious mobile activity for example.

User activity alerts like when a user is added or deleted, granted Admin privileges or suspended for example.

 

10.
Question 10
Your organization recently purchased some new domains and would like to add them to your Cloud Identity account. Your IT manager isn’t sure whether to add your domain as a domain alias or as an additional domain and has asked you to clarify the difference between each. How would you describe the difference between each?

1 point

When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.

When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.

When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.

When you add the domain as a domain alias, each user will have a new Cloud Identity account created for them and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.

 

Important Links: