Security Flashcards
What Identity and Access service can use identity and context to guard access to your applications and VMs?
Resource Manager
IAM
Identity-Aware Proxy
Security key enforcement
Identity-Aware Proxy
What security service lets you gain visibility into who did what, when, and where for all user activity on Google Cloud?
Cloud Key Management Service
Cloud HSM
Cloud Audit Logs
Access Transparency
Cloud Audit Logs
What Identity and Access service is a zero-trust solution that enables secure access with integrated threat and data protection?
IAM
BeyondCorp Enterprise
Identity-Aware Proxy
Cloud Identity
BeyondCorp Enterprise
What Identity and Access service can easily manage user identities, devices, and applications from one console?
Cloud Identity
What Identity and Access service can establish fine-grained identity and access management for Google Cloud resources?
IAM
What security service can get visibility over your cloud provider through near real-time logs?
Access Transparency
What user protection service helps protect your website from fraudulent activity, spam, and abuse?
Single sign-on
reCAPTCHA Enterprise
Web Risk
Phishing Protection
reCAPTCHA Enterprise
What user protection service helps protect your users from phishing sites?
Phishing Protection
What secure by design infrastructure ensures access to sensitive data is protected by advanced tools like phishing-resistant security keys?
Operational and device security
Data centers
Storage service
Identity
Identity
What secure by design infrastructure is where network and infrastructure have multiple layers of protection to defend our customers against denial-of-service attacks?
Service deployment
Hardware infrastructure
Internet communication
Operational and device security
Internet communication
What secure by design infrastructure underpins how Google Cloud delivers services that meet their high standards for performance, resilience, availability, correctness, and security?
Storage services
Data centers
Service deployment
Continuous availability
Continuous availability
What Secure-By-Design Infrastructure develops and deploys infrastructure software using rigorous security practices?
Operational and device security
What Secure-By-Design Infrastructure ensures that any application that runs on Google’s infrastructure is deployed with security in mind?
Service deployment
What provides you with easy, on-demand access to critical compliance resources, at no additional cost?
GCP Console
Managed Service for Microsoft Active Directory
IAM
Compliance Reports Manager
Compliance Reports Manager
What Google Cloud Compliance program is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment?
Cloud Security Alliance (CSA) STAR Certification
System and Organization Controls (SOC)
Payment Card Industry Data Security Standard (PCI DSS)
Federal Information Processing Standard (FIPS) 140-2
Payment Card Industry Data Security Standard (PCI DSS)
What Google Cloud Compliance program is the US federal law that regulates patient Protected Health Information?
Health Insurance Portability and Accountability Act (HIPAA).
General Data Protection Regulation (GDPR)
Cloud Security Alliance (CSA) STAR Certification
Criminal Justice Information Services (CJIS)
Health Insurance Portability and Accountability Act (HIPAA).
What Google Cloud Compliance program is an independent third-party assessment of a cloud provider’s security posture?
Cloud Security Alliance (CSA) STAR Certification
What Google Cloud Compliance program is the US government standardized approach to security authorizations for Cloud Service Offerings?
Federal Risk and Authorization Management Program (FedRAMP)
Which Google’s Trust Principles is NOT true?
Our privacy practices are audited against international standards
We guard against insider access to your data
Google can legally sell customer data to third parties
All customer data is encrypted by default
Google can legally sell customer data to third parties
Which of the following Google Cloud Enterprise Privacy Commitments is true? (Choose 3)
Product quality is a priority, security and privacy is not a primary aspect of design
You control your data
We are commited to use customer data or service data to leverage sales
We are transparent about data collection and use
We never use your data for ads targeting
You control your data
We are transparent about data collection and use
We never use your data for ads targeting
Additional:
All customer data is encrypted by default
We guard against insider access to your data
We never give any government entity “backdoor” access
Our privacy practices are audited against international standards
What is Google Cloud Enterprise Privacy Commitments?
Google Cloud Enterprise Privacy Commitments describe how we protect the privacy of Google Cloud Platform and Google Workspace customers