Security 2 Flashcards

1
Q

What are the two tiers available for Cloud Armor?

a. Premium

b. Standard

c. Managed Protection Plus

d. Bonus Protection

A

Standard

Managed Protection Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Armor is a ________ and ________ service​

a. Virus protection, Networking

b. DDOS protection, Web Application Firewall (WAF)

c. DDOS protection, WiFi

d. Storage management, Web Application Firewall (WAF)

A

DDOS protection, Web Application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a malicious attempt to disrupt normal traffic by flooding a website with large amounts of fake traffic?

A

a DDoS (Distributed Denial of Service) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What service allows you to package Google cloud resources into a service offering that can be then made available and discoverable in a catalog internally to your organization to quickly deploy governed stacks and workloads?

a. Cloud Identity

b. Private Catalog

c. IAM

d. Cloud Armor

A

b. Private Catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Threat detection feature in Security Command Center do?

a. audits your cloud resources for security vulnerability

b. continuously scans for malicious attempts

c. inventory and historical information about your google cloud resources

d. fix security misconfiguration with single-click remediation

A

a. audits your cloud resources for security vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the “Asset discovery and inventory” feature in Security Command Center do?

a. audits your cloud resources for security vulnerability

b. collection of event logs for threat detection

c. provides inventory and historical information about your google cloud resources

d. fix security misconfiguration with single-click remediation

A

c. provides inventory and historical information about your google cloud resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a centralized security and risk management platform for your google cloud resources?

A

Security Command Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Birthday, government ID, full name, email address, mailing address are examples of …

a. Cloud Identity

b. Private Catalog​

c. Personally identifiable information (PII)

d. Personally/Protected Health Information (PHI)

A

Personally identifiable information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is any data that can be used to identify health information about a patient​?

a. Personally identifiable information (PII)

b. Personally/Protected Health Information (PHI)

c. Cloud Identity

d. Security Command Center​

A

Personally/Protected Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is used to detect and protect sensitive information within GCP storage repositories​?

A

Cloud Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are BeyondCorp’s principles? (Choose 3)

a. Access to services must not be determined by the network from which you connect ​

b. Access to services is granted based on contextual factors from the user and their device​

c. Access to services related to storage and data is secondary

d. Access to services must be authenticated, authorized, and encrypted

A

a. Access to services must not be determined by the network from which you connect ​
b. Access to services is granted based on contextual factors from the user and their device​
d. Access to services must be authenticated, authorized, and encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is NOT a feature of BeyondCorp?

a. access control policies​

b. single sign-on​

c. IP-based

d. access proxy

A

c. IP-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What puts identity as the primary security perimeter to be protected?

A

A Zero Trust model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When creating an access policy, what attributes can you use to determine the level of access?

All of the options

Operating System​

IP Address​

Device Type​

User Identity​

A

All of the options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Context Manager keeps mobile workforces utilizing ________ secure.​

Bring-Your-Own-Devices (BYOD)

Networking devices

On-premise infrastructure

Pay as you go Service (PAYG)

A

Bring-Your-Own-Devices (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What allows Google Cloud organization admins to define fine-grained, attribute-based access control for projects and resources in Google Cloud.?

A

Access Context Manager

17
Q

VPC Service Perimeters function like a firewall for GCP APIs​

False

True

A

True

18
Q

What is automatically created for you when you create an access level, service perimeter, or turn on IAP?

GCP APIs

VPC Service Perimeters

VPC Service Controls

Access policies

A

Access policies

19
Q

What is VPC Service Controls?

A

VPC Service Controls allows you to create a service perimeter​

20
Q

What lets you manage who has access to services hosted on App Engine, Compute Engine, or an HTTPS Load Balancer?

Access Context Manager

Identity-Aware Proxy (IAP)

Security Command Center

Private Catalog​

A

Identity-Aware Proxy (IAP)

21
Q

What allows you to establish a central authorization layer for HTTPS-enabled applications, allowing you to utilize an application-level access control model rather than depending on network-level firewalls?

A

Cloud Identity-Aware Proxy (IAP)

22
Q

Which BeyondCorp Enterprise feature prevents data loss, stops common threats​, and provides real-time alerts, and detailed reporting?

Integrated threat and data protection​

Identity and context-aware access control​

Rely on Google Cloud’s global infrastructure​

Support your environment: cloud, on-premises, or hybrid​

A

Integrated threat and data protection​

23
Q

What does the “Rely on Google Cloud’s global infrastructure” in BeyondCorp Enterprise​ mean? (Choose 2)

scale, reliability, and security of Google’s network​

non-disruptive overlay to your existing architecture​

no need to install additional agents

144 edge locations in over 200 countries and territories

A

scale, reliability, and security of Google’s network​
144 edge locations in over 200 countries and territories

24
Q

What is enabled through Chrome Browser Cloud Management so you can protect against threats such as malware and phishing for your Chrome users as they download and upload files​?

A

BeyondCorp Enterprise