Security Flashcards

1
Q

What is the principle of separation of duties?

A

A security principle that ensures no single individual has control over all aspects of any critical process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ‘defense in depth’ refer to?

A

A layered security approach that uses multiple security measures to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default encryption status of data in Google Cloud?

A

Everything is always encrypted at rest and in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BeyondCorp?

A

A security model that focuses on identity rather than network location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cloud Identity?

A

An Identity as a Service (IDaaS) solution that centrally manages users and groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Cloud Identity prevent?

A

Prevents users from using personal accounts to access corporate resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can existing corporate directories like Microsoft AD be used with Cloud Identity?

A

By scheduling a one-way sync using Google Cloud Directory Sync (GCDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Identity and Access Management (IAM) in Google Cloud?

A

It provides authorization controls to Google Cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a role in IAM?

A

A collection of permissions granted to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are primitive roles in IAM?

A

Basic roles that are project-level and often too broad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are predefined roles in IAM?

A

Roles that provide granular access to specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the maximum number of member bindings allowed per IAM policy?

A

1,500 member bindings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Child policies can restrict access granted at a higher level.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are IAM Conditions used for?

A

To define and enforce conditional, attribute-based access for resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best practice regarding IAM roles?

A

Use groups instead of individual accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the command to undelete a custom role within 7 days?

A

gcloud iam roles undelete.

17
Q

What do service accounts provide?

A

An identity for carrying out server-to-server interactions.

18
Q

What is Cloud Armor?

A

Edge-level protection from DDoS and other attacks on global HTTP(S) LB.

19
Q

What does the Cloud DLP API do?

A

Finds and optionally redacts sensitive information in unstructured data streams.

20
Q

What is Cloud Security Command Center (Cloud SCC)?

A

GCP’s SIEM for reviewing and managing security across services.

21
Q

What is Cloud KMS?

A

Google’s low-latency service to manage and use keys.

22
Q

What is the purpose of Cloud HSM?

A

To host encryption keys and perform cryptography operations.

23
Q

Fill in the blank: All data on GCP is encrypted in transit and at rest by default using _______.

A

customer-supplied encryption keys.

24
Q

What is the 24-hour delay in Cloud KMS for?

A

To prevent accidental or malicious data loss during key deletion.

25
Q

What are service accounts authenticated with?

26
Q

What is the function of the Activity Analyzer?

A

To see reports about service accounts’ latest usage.

27
Q

What is the role of Organizational Policy Service?

A

To provide centralized control over the organization’s cloud resources.

28
Q

What are ‘Security Marks’ used for in Cloud SCC?

A

To group, track, and manage resources.

29
Q

What is a characteristic of Google App Engine’s Security Scanner?

A

It is free but limited and has very low false positive rates.