Security Flashcards
What Identity and Access service can use identity and context to guard access to your applications and VMs?
Resource Manager
IAM
Identity-Aware Proxy
Security key enforcement
Identity-Aware Proxy
What security service lets you gain visibility into who did what, when, and where for all user activity on Google Cloud?
Cloud Key Management Service
Cloud HSM
Cloud Audit Logs
Access Transparency
Cloud Audit Logs
What Identity and Access service is a zero-trust solution that enables secure access with integrated threat and data protection?
IAM
BeyondCorp Enterprise
Identity-Aware Proxy
Cloud Identity
BeyondCorp Enterprise
What Identity and Access service can easily manage user identities, devices, and applications from one console?
Cloud Identity
What Identity and Access service can establish fine-grained identity and access management for Google Cloud resources?
IAM
What security service can get visibility over your cloud provider through near real-time logs?
Access Transparency
What user protection service helps protect your website from fraudulent activity, spam, and abuse?
Single sign-on
reCAPTCHA Enterprise
Web Risk
Phishing Protection
reCAPTCHA Enterprise
What user protection service helps protect your users from phishing sites?
Phishing Protection
What secure by design infrastructure ensures access to sensitive data is protected by advanced tools like phishing-resistant security keys?
Operational and device security
Data centers
Storage service
Identity
Identity
What secure by design infrastructure is where network and infrastructure have multiple layers of protection to defend our customers against denial-of-service attacks?
Service deployment
Hardware infrastructure
Internet communication
Operational and device security
Internet communication
What secure by design infrastructure underpins how Google Cloud delivers services that meet their high standards for performance, resilience, availability, correctness, and security?
Storage services
Data centers
Service deployment
Continuous availability
Continuous availability
What Secure-By-Design Infrastructure develops and deploys infrastructure software using rigorous security practices?
Operational and device security
What Secure-By-Design Infrastructure ensures that any application that runs on Google’s infrastructure is deployed with security in mind?
Service deployment
What provides you with easy, on-demand access to critical compliance resources, at no additional cost?
GCP Console
Managed Service for Microsoft Active Directory
IAM
Compliance Reports Manager
Compliance Reports Manager
What Google Cloud Compliance program is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment?
Cloud Security Alliance (CSA) STAR Certification
System and Organization Controls (SOC)
Payment Card Industry Data Security Standard (PCI DSS)
Federal Information Processing Standard (FIPS) 140-2
Payment Card Industry Data Security Standard (PCI DSS)