Identity and Security Flashcards

1
Q

Fine-grained, attribute based access-control

A

Access Context Manager (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit cloud provider access

A

Access Transparency (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Workload compliance controls

A

Assured Workloads (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero trust secure access

A

BeyondCorp Enterprise (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kubernetes deploy-time security

A

Binary Authorization (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed private CAs

A

Certificate Authority Service (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Find threats from security telemetry

A

Chronicle (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All assets, one place

A

Cloud Asset Inventory (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit trails

A

Cloud Audit Logs (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classify and redact sensitive data

A

Cloud Data Loss Prevention (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

External keys you control/manage

A

Cloud EKM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware security module service

A

Cloud HSM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Resource access control

A

Cloud IAM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Manage Users, devices, and apps

A

Cloud Identity (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity-based app access

A

Cloud Identity-Aware Proxy (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hosted key management service

A

Cloud KMS (Identity and Security)

17
Q

Encrypt data in-use

A

Confidential Computing (Identity and Security)

18
Q

End-user attribute-based access control

A

Context-aware Access (Identity and Security)

19
Q

Scans for suspicious activity

A

Event threat detection (Identity and Security)

20
Q

Drop-in Authentication, Access-Management

A

Identity Platform (Identity and Security)

21
Q

Managed Microsoft Active Directory

A

Managed Service for Microsoft Active Directory (Identity and Security)

22
Q

Cloud project metadata management

A

Resource Manager (Identity and Security)

23
Q

Evaluate organization’s security posture

A

Risk Manager (Identity and Security)

24
Q

Store and manage secrets

A

Secret Manager (Identity and Security)

25
Security management and data risk platform
Security Command Center (Identity and Security)
26
Two-step key verification
Security Key Enforcement (Identity and Security)
27
Hardened VMs
Shielded VMs (Identity and Security)
28
Secure software supply chain
Software Delivery Shield (Identity and Security)
29
Two-factor authentication (2FA) device
Titan Security Key (Identity and Security)
30
VPC data constraints
VPC Service Controls (Identity and Security)
31
Research/hunt for malware
VirusTotal (Identity and Security)
32
App engine security scanner
Web Security Scanner (Identity and Security)
33
Identifies web-app security vulnerabilities
We Security Scanner (Identity and Security)
34
Protect website against bots
reCAPTCHA Enterprise (Identity and Security)