Module Quiz >> Ask Questions to Make Data-Driven Decisions
TOTAL POINTS 3
1.In GCP, what is the minimum number of IP addresses that a VM instance needs?
1 point
Correct: That’s correct! In GCP, each virtual machine needs to have an internal IP address. The external IP address is optional; therefore, a VM instance only needs one IP address.
2.What are the three types of networks offered in the Google Cloud Platform?
1 point
Correct: The three network types offered by GCP are: default, auto and custom.Each project starts with a default network. The auto-type network uses the same subnet IP ranges as the default-type, with a network name other than default. A custom-type allows you to specify the IP ranges of subnets.
3.What is one benefit of applying firewall rules by tag rather than by address?
1 point
Correct: When a VM is created the ephemeral external IP address is assigned from a pool. There is no way to predict which address will be assigned, so there is no way to write a rule that will match that VM’s IP address before it is assigned. Tags allow a symbolic assignment that does not depend on order in the IP addresses. It makes for simpler, more general, and easier to maintain, firewall rules.
Related Questions & Answers:
- Module Quiz-1 Module Quiz >> Ask Questions to Make Data-Driven Decisions 1.Which of the following does not allow you to interact with ... Read more...
- Module Quiz-3 Module Quiz >> Ask Questions to Make Data-Driven Decisions TOTAL POINTS 3 1.Which statement is true of Virtual Machine ... Read more...
- Module 4 Quiz >> Cloud Computing Basics (Cloud 101) Module 4 Quiz >> Cloud Computing Basics (Cloud 101) 1. A hosting strategy where software products are installed on the ... Read more...
- Module 4 Graded Assessment Module 4 Graded Assessment >> Crash Course on Python *Please Do Not Click On The Options. *Wait 15 seconds To ... Read more...
- The Network Layer The Network Layer >> The Bits and Bytes of Computer Networking Question 1 Nice job! ARP is used to discover ... Read more...
- Defense in Depth Defense in Depth >> IT Security: Defense against the digital dark arts Question 1 How are attack vectors and attack ... Read more...