IntroductiontoCloudIdentityCourseraQuizAnswer[đź’ŻCorrectAnswer]

Hello Peers, Today we are going to share all week assessment and quizzes answers of Introduction to Cloud Identity course launched by Coursera for totally free of costâś…âś…âś…. This is a certification course for every interested students.

In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.

Checkout this article for – “How to Apply for Financial Ads?”

Coursera, a India’s biggest learning platform which launched millions of free courses for students daily. These courses are from various recognized university, where industry experts and professors teaches in a very well manner and in a more understandable way.

Here, you will find Introduction to Cloud Identity Exam Answers in Bold Color which are given below.

These answers are updated recently and are 100% correctâś… answers of all week, assessment and final exam answers of Introduction to Cloud Identity from Coursera Free Certification Course.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

Apply Link – Introduction to Cloud Identity Answer

Week- 1: Introductory Survey

1.
Question 1
How would you rate your confidence to succeed in online courses? (Select one)

1 point

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high

2.
Question 2
An online course will require you to spend a lot of time… (Select one)

1 point

  • Traveling to class
  • Viewing introduction videos, going through in-product training, practicing through exercises, and interacting with others in the discussion forums.
  • Sitting in class and listening to live lectures.
  • Searching Google for the answers to the quizzes.

3.
Question 3
How would you rate your confidence to succeed in the field of information technology and/or system administration?

1 point

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high

4.
Question 4
How important do you think system administration skills will be to your career?

1 point

  • Very low
  • Somewhat low
  • Neutral
  • Somewhat high
  • Very high
User Lifecycle Management

1.
Question 1
What is the minimum information required to create a new user in your domain? (Select 3)

1 point

  • First name
  • Last name
  • Primary email address
  • Phone number

2.
Question 2
When adding multiple users to the CSV file, what is the minimum information required?

1 point

  • First name
  • Last name
  • Email address
  • Password
  • All of the above

3.
Question 3
Your organization just acquired a 100+ employee startup. You need to quickly create user accounts and add all of the new employees to your domain. Using the Admin console, which is the most efficient way to add new users all at once?

1 point

  • Add each new user manually.
  • Have each new user create their own accounts with the “Invite users” option.
  • Add all the new users at once from a .csv file.
  • Request the new users’ manager to add each new user manually.

4.
Question 4
Tim Lee has called you to reset his password, because he’s forgotten it and is now locked out of his account. What are the steps to reset his password in the Admin console?

1 point

  • Click the Users icon.
    In the user list, click Tim Lee.
    Click the Reset password icon.
    Check the Require a change of password in the next sign in box.
    Fill in a temporary password or click Auto-generate password.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Fill in a temporary password or click Auto-generate password.
    Click the Reset password icon.
    Check the Require a change of password in the next sign in box.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Check the Require a change of password in the next sign in box.
    Fill in a temporary password or click Auto-generate password.
    Click the Reset password icon.
  • Click the Users icon.
    In the user list, click Tim Lee.
    Click the Reset password icon.
    Fill in a temporary password or click Auto-generate password.
    Check the Require a change of password in the next sign in box.

Question 5
What happens when you suspend a user’s account? (Select 3)

1 point

  • Temporarily blocks a user’s access to your organization’s cloud services
  • Disables the account without deleting the user’s profile and related information
  • Deletes the user’s profile and related information
  • The user can’t sign in to the account

6.
Question 6
What happens when you delete a Cloud Identity user’s account? (Select 3)

1 point

  • Temporarily blocks a user’s access to your organization’s cloud services.
  • Admins can no longer manage that user or access their data from the Google Admin console.
  • The user can’t access any of your organization’s G Suite services, such as Google Drive files or Gmail.
  • All data for that user is deleted.

7.
Question 7
The IT manager at your organization wants to know how Google Cloud Directory Sync (GCDS) works. Select the order that best describes how GCDS works.

1 point

  • GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    Data is exported in a list from your LDAP server or Active Directory.
    GCDS compares these lists and updates your Google domain to match the data.
  • Data is exported in a list from your LDAP server or Active Directory.
    GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    GCDS compares these lists and updates your Google domain to match the data.
  • GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.
    GCDS compares these lists and updates your Google domain to match the data.
    Data is exported in a list from your LDAP server or Active Directory.
  • Data is exported in a list from your LDAP server or Active Directory.
    GCDS compares these lists and updates your Google domain to match the data.
    GCDS connects to the Google domain and generates a list of Google users, groups, and shared contacts.

8.
Question 8
What actions can only a super administrator perform? (Select 3)

1 point

  • Create new groups
  • Create or assign administrator roles
  • Set up billing
  • Restore deleted users

9.
Question 9
What’s the recommended way to create a custom administrator role for your domain?

1 point

  • Create a new role and edit the privileges
  • Duplicate an existing role and edit the privileges.
  • Create a new role based on a role template.
  • Choose custom administrator option when manually adding the user.

10.
Question 10
When assigning an administrative role to a single user, where in the user’s account page do you assign the role?

1 point

  • Groups
  • License
  • Admin roles and privileges
  • Security

11.
Question 11
You are meeting with your IT manager to explain the reasons for creating an organizational structure within your Cloud Identity domain. What are some of the reasons you would say? (Select 3)

1 point

  • You can control which applications and services are available to our users.
  • You can configure the different available services for each set of users.
  • Having multiple domains, you won’t be able to mix and match users from all of our domains into an organizational unit.
  • You can configure different Chrome OS device settings for different sets of devices.

12.
Question 12
What are some of the essential guidelines and tips for creating multiple accounts? (Select 3)

1 point

  • Format your file as a table and include headers to define each field.
  • Upload large CSV files.
  • If you include an existing username in your file, the user’s password, and first and last name will be updated.
  • Split your table into smaller chunks before saving each one as a CSV file.
Security

1.
Question 1
What are some best practices for reinforcing and monitoring the security of your Cloud Identity domain? Select all that apply.

1 point

  • View user account activity reports
  • Ensure your domain is setup correctly
  • View and manage your users’ security settings
  • Set up 2-step verification

2.
Question 2
The IT manager at your organization wants to know the advantages of using 2-Step Verification for your organization. What should you say? Select all that apply.

1 point

  • It’ll greatly reduce the risk of unauthorized access if a user’s password is compromised.
  • We wouldn’t have to manage individual user IDs and passwords for each user.
  • It would be a great opportunity to make sure everyone is the organization has a security key.
  • It’ll reinforce our domain’s password security by requiring our users to enter an additional code.

3.
Question 3
Where do you go to enable 2-Step Verification for your domain to ensure it’s available for your users?

1 point

  • Security > Password monitoring
  • Users > [User’s Name] > Security
  • Reports > Security
  • Security > Basic settings

4.
Question 4
The IT manager at your organization hasn’t had a chance to explore the Admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? Select all that apply.

1 point

  • Examine a user’s password strength
  • Determine if the user has 2-Step Verification set up
  • Review a user’s administrative access
  • Temporarily disable the user’s Login Challenge for 10 minutes

5.
Question 5
What data can you view in the Account activity report for users? Select all that apply.

1 point

  • User Account Status
  • Admin Status
  • 2-Step Verification Enrollment
  • Managed devices

6.
Question 6
Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the Admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?

1 point

  • Apps > SAML apps > plus sign (+) > Select Setup My Own Custom App from the Enable SSO for SAML Application window
  • Security > Set up single sign-on (SSO) > Check the Setup SSO with third party identity provider box and provide the necessary information
  • Apps > SAML apps > plus sign (+) > Select Asana from the Enable SSO for SAML Application window
  • Security > Basic Settings > Under Two-step verification, click on Go to advanced setting to enforce 2-step verification

7.
Question 7
Where do you go to manage your users’ password strength?

1 point

  • Security > Password monitoring
  • Security > Password management
  • Users > [User’s Name] > Account
  • Reports > Security

8.
Question 8
Your organization has decided to enforce 2-Step Verification in 2 weeks. What actions should you keep in mind when enforcing 2-Step Verification? Select all that apply.

1 point

  • You’ll need to provide a lead time for users to enroll in 2-Step Verification before enforcement.
  • You’ll want to confirm that all of your users are enrolled in 2-Step Verification before enforcement.
  • When you create new user accounts after enforcement, you will need to place these users into an exception group so they can access their account and enroll in 2-Step Verification.
  • Enforcing 2-Step Verification will not affect your users whether they are enrolled in 2-Step Verification or not.

9.
Question 9
Where in the Admin console do you go to enable API access that allows access to various Admin SDK APIs?

1 point

  • Security > Advanced settings
  • Security > API Permissions
  • Security > Basic settings
  • Security > API reference

10.
Question 10
What are some of the best ways you can protect your users against phishing attacks? Select all that apply.

1 point

  • Assign appropriate administrator roles
  • Verify a user’s identity with a Login Challenge
  • Set up 2-Step Verification
  • Deploy the Password Alert extension
Google Mobile Management

1.
Question 1
What icon do you click on the Admin Console dashboard in order to access the Google Mobile Management toolset?

1 point

  • Company profile
  • Apps
  • Groups
  • Device Management

2.
Question 2
In order to to enable Mobile Management for your domain, what click-path do you follow?

1 point

  • Device Management >> Setup >> Mobile Management >> Toggle Enabled
  • Apps >> Setup >> Mobile Management >> Toggle Enabled
  • Groups >> Enable Mobile Management
  • Device Management >> Android Settings >> General Settings >> Application Auditing

3.
Question 3
Which of the following Google Mobile Management feature sets are only available in advanced management? Select all that apply.

1 point

  • Secure devices with a screen lock
  • Restrict access to device settings and features
  • Monitor compliance with policies you set
  • Remote account wipe

4.
Question 4
An end user in your organization has lost their device, based on this training, what would be your next step?

1 point

  • Ask the user where they think they lost the device, and wait for them to find it.
  • Immediately get your user a new mobile device.
  • Wipe the user’s device.
  • Suspend the user.

5.
Question 5
Once users have signed into their personal devices with their new Google Accounts, where will you see these devices?

1 point

  • The users will be able to sign in, and then you won’t be able see them in the admin console.
  • You will see them in the Mobile Devices dashboard.
  • The users’ devices will show up in the in Android Settings feature page.
Domains and Reports

1.
Question 1
What information can you find on the Highlights report page? Select all that apply.

1 point

  • Users not enrolled in 2 step verification
  • Users allowed access to less secure apps
  • Changes made to group memberships
  • External apps installed

2.
Question 2
Your IT manager would like to know the total admins in your organization, which report can you generate to find this information?

1 point

  • Security reports
  • Highlights report
  • Account activity reports
  • Aggregate reports

3.
Question 3
After rolling out security keys as part of your organization’s 2-step verification initiative, your IT manager would like to know which users have enrolled their security keys. Which report can you generate to find this information?

1 point

  • Account activity reports
  • Security reports
  • Highlights report
  • Aggregate reports

4.
Question 4
Your IT manager would like to know which users are using third-party web applications in your domain, which audit can you generate to find this information?

1 point

  • Admin audit log
  • Groups audit log
  • OAuth Token audit log
  • SAML audit log

5.
Question 5
Which audit log shows a history of every task performed in your Google Admin console and who performed the task?

1 point

  • Admin audit log
  • OAuth Token audit log
  • SAML audit log
  • Groups audit log

6.
Question 6
What data can you track using the Login audit log? Select all that apply.

1 point

  • Each time a user has an invalid service provider ID
  • Each time a user fails to log in
  • Each time a user logged out
  • Each time a user logged in and there were some unusual characteristics

7.
Question 7
Once you opened a report or audit log, what additional actions can you take? Select all that apply.

1 point

  • You can customize the report or audit log by filtering the data by user or activity.
  • You can download and export your report or audit log data to a CSV file.
  • You can change the data you see in the report or audit log by clicking on the down arrow next to the title above the chart.
  • You can change the data you see in the report or audit log by or clicking on the Select Columns button to change the view of the available columns.

8.
Question 8
How do you turn on or off administrator email alerts?

1 point

  • Reports > Manage alerts > click on settings
  • Reports > Manage alerts > toggle switch on or off in the Status column
  • Reports > Manage alerts > click on the predefined alert to edit
  • Reports > Admin > Filters > Set Alert

9.
Question 9
What type of email administrator email alerts can you receive? Select all that apply.

1 point

  • Your own custom alerts based on your organization audit logs like Admin, Login or Tokens for example.
  • 2-Step Verification and when a user enrolls in 2 Step-Verification or a security key.
  • Mobile device activity alerts like device compromise update or suspicious mobile activity for example.
  • User activity alerts like when a user is added or deleted, granted Admin privileges or suspended for example.

10.
Question 10
Your organization recently purchased some new domains and would like to add them to your Cloud Identity account. Your IT manager isn’t sure whether to add your domain as a domain alias or as an additional domain and has asked you to clarify the difference between each. How would you describe the difference between each?

1 point

  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and you’ll have to pay for each user account added in the additional domain.
  • When you add the domain as a domain alias, each user will have an email address at both your primary domain and domain alias and there is no additional cost per user or group. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.
  • When you add the domain as a domain alias, each user will have a new Cloud Identity account created for them and you’ll have to pay for each user account added in the additional domain. When you add the domain as an additional domain, each user will have a new Cloud Identity account created for them at the new domain and there is no additional cost per user or group.

Conclusion

Hopefully, this article will be useful for you to find all the Modules and Final Quiz Answers of Introduction to Cloud Identity Answer and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also and follow our Techno-RJ Blog for more updates.

Leave a Comment

Scroll to Top