0
0
GCPcloud~20 mins

Why advanced IAM matters in GCP - Challenge Your Understanding

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Advanced IAM Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding IAM Role Granularity

Which of the following best explains why using very broad IAM roles (like Owner) for all users is a bad practice?

AIt makes it easier to manage permissions because everyone has the same access.
BIt increases the risk of accidental or malicious changes because users have more permissions than needed.
CIt reduces the number of API calls needed to check permissions.
DIt automatically encrypts all data in the project.
Attempts:
2 left
💡 Hint

Think about what happens if someone has more access than they really need.

security
intermediate
2:00remaining
Identifying Risky IAM Configurations

Which IAM configuration below creates the highest security risk in a Google Cloud project?

AGranting the 'roles/owner' role to a user who only needs to read logs.
BGranting the 'roles/editor' role to a service account used only by a specific app.
CGranting the 'roles/viewer' role to a user on a single storage bucket.
DGranting the 'roles/logging.viewer' role to a user who monitors logs.
Attempts:
2 left
💡 Hint

Consider the principle of least privilege and what each role allows.

Architecture
advanced
3:00remaining
Designing IAM for a Multi-Team Project

You have three teams: Developers, QA, and Operations. Developers need to deploy apps, QA needs to run tests but not deploy, and Operations needs to manage infrastructure but not code. Which IAM setup best fits these needs?

AAssign 'roles/owner' to all teams for simplicity.
BAssign 'roles/editor' to Developers, 'roles/viewer' to QA, and 'roles/owner' to Operations.
CAssign 'roles/viewer' to all teams and escalate permissions when needed.
DAssign custom roles: Developers get deploy permissions, QA get test execution permissions, Operations get infrastructure management permissions.
Attempts:
2 left
💡 Hint

Think about giving only the permissions each team needs.

service_behavior
advanced
2:00remaining
Effect of Over-Permissive IAM on Service Behavior

What is a likely outcome if a service account used by an app has the 'roles/storage.admin' role instead of a more limited role?

AThe app can create, delete, and modify all storage buckets and objects, increasing risk if compromised.
BThe app automatically encrypts all data stored.
CThe app will fail to access storage buckets due to insufficient permissions.
DThe app can only read storage buckets but cannot modify them.
Attempts:
2 left
💡 Hint

Consider what 'storage.admin' allows compared to limited roles.

Best Practice
expert
3:00remaining
Implementing Least Privilege with IAM Conditions

You want to allow a user to start Compute Engine instances only during business hours (9am-5pm). Which IAM feature should you use to enforce this?

AAssign the 'roles/compute.instanceAdmin' role without restrictions.
BUse VPC firewall rules to block access outside business hours.
CUse IAM Conditions to restrict the 'compute.instanceAdmin' role to business hours.
DCreate a custom role without any time restrictions.
Attempts:
2 left
💡 Hint

Think about how to limit permissions based on time.