exam questions

Exam Cloud Digital Leader All Questions

View all questions & answers for the Cloud Digital Leader exam

Exam Cloud Digital Leader topic 1 question 253 discussion

Actual exam question from Google's Cloud Digital Leader
Question #: 253
Topic #: 1
[All Cloud Digital Leader Questions]

An organization wants to control what types of network traffic are allowed to enter and leave its network and access its applications. Which security measure should the organization use?

  • A. 2-Step Verification
  • B. Privileged access
  • C. Encryption keys
  • D. Firewall rules
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
joshnort
5 months ago
Selected Answer: D
D. Firewall rules. Firewall rules are used to control the types of network traffic that are allowed to enter and leave a network. They can be configured to permit or block specific IP addresses, ports, and protocols, thereby controlling access to applications, services, and other network resources. Firewalls can be set up at various levels (e.g., perimeter, internal network, or cloud-based) to enforce these security policies.
upvoted 1 times
joshnort
5 months ago
Why the other options are incorrect: A. 2-Step Verification: 2-Step Verification (also known as multi-factor authentication or MFA) is a security measure used to ensure that users are who they say they are before accessing systems or accounts. While it's crucial for securing user accounts, it does not control or manage network traffic or access to applications at the network level. B. Privileged access: Privileged access refers to giving users elevated access rights or permissions within a system or application, often associated with administrative roles. While managing privileged access is important for ensuring that sensitive resources are protected, it does not specifically control network traffic entering or leaving the network.
upvoted 1 times
joshnort
5 months ago
C. Encryption keys: Encryption keys are used to secure data during transmission or while stored, ensuring data confidentiality and integrity. While encryption protects the data itself, it does not control the network traffic that enters or exits the system. Firewall rules are the appropriate measure for controlling traffic flow.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...