Identity and Access Flashcards

1
Q

Access Approval

A

Access Approval allows customers to approve eligible manual, targeted accesses by Google administrators to their data or workloads before those accesses happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Context Manager

A

Access Context Manager allows Google Cloud organization administrators to define fine-grained, attribute based access control for projects, apps and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BeyondCorp Enterprise

A

BeyondCorp Enterprise is a solution designed to enable zero-trust application access to enterprise users and protect enterprises from data leakage, malware and phishing attacks. BeyondCorp Enterprise is an integrated platform incorporating cloud-based services and software components, including:

On-premises Connector
Forwards Identity-Aware Proxy traffic from Google Cloud Platform to applications and VMs deployed in non-Google Cloud Platform environments.

Endpoint Verification
Allows administrators to build an inventory of devices and set the security posture of the devices.

Threat and Data Protection Services
A set of security services that work by aggregating threat intelligence and are designed to protect enterprise users from malware transfers, phishing, malicious site visits, and sensitive data leakage.

Integration with Chrome Browser Cloud Management
Enables malware, phishing, and data leakage protection for managed Chrome browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Identity Services

A

Cloud Identity Services are the services and editions as described at: https://cloud.google.com/terms/identity/user-features.html or such other URL as Google may provide.

These include:

Cloud Identity Management, Google Contacts, Google Docs, Google Sheets, Google Slides, Google Forms, Google Drive, Google Groups for Business, Google Keep, Google Sites, Cloud Identity Free/Premium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firebase Authentication

A

Firebase Authentication provides a service as part of the Firebase platform to authenticate and manage users in your applications. It supports authentication using email & password, phone number and popular federated identity providers like Google and Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Google Cloud Identity-Aware Proxy

A

Google Cloud Identity-Aware Proxy is a tool that helps control access, based on a user’s identity and group membership, to applications running on Google Cloud Platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity & Access Management (IAM)

A

Identity & Access Management (IAM) provides administrators the ability to manage cloud resources centrally by controlling who can take what action on specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity Platform

A

Identity Platform provides you with functionality and tools to manage your users’ identities and access to your applications.

Identity Platform supports authentication and management of users with a variety of methods, including email & password, phone number, and popular federated identity providers like Google and Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Managed Service for Microsoft Active Directory (AD)

A

Managed Service for Microsoft AD is a Google Cloud service running Microsoft AD that enables you to deploy, configure and manage cloud-based AD-dependent workloads and applications. It is a fully-managed service that is highly available, applies network firewall rules, and keeps AD servers updated with Operating System patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Resource Manager API

A

Resource Manager API allows you to programmatically manage Google Cloud Platform container resources (such as Organizations and Projects), that allow you to group and hierarchically organize other Google Cloud Platform resources.

This hierarchical organization lets you easily manage common aspects of your resources such as access control and configuration settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly