Quiz - Protect and Manage Resources
Copyright © 2020 ChandraMohan Lingam. All Rights Reserved.

To receive a copy of your response fill out your email.
Sign in to Google to save your progress. Learn more
Email *
The case-study and quizzes are from the courses:
Which one of these options may not help in safeguarding data from an attacker who managed to gain read access to the bucket? *
5 points
What additional policy statement could block the requests from an attacker? *
5 points
An EC2 instance is configured to use only version 2 of instance metadata service (IMDS). What call is used for acquiring a token from IMDS? *
5 points
Which of these tools may have blocked the attacker described in the case study? *
5 points
A copy of your responses will be emailed to the address you provided.
Clear form
This content is neither created nor endorsed by Google.