Identity and Security Flashcards

1
Q

Fine-grained, attribute based access-control

A

Access Context Manager (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit cloud provider access

A

Access Transparency (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Workload compliance controls

A

Assured Workloads (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero trust secure access

A

BeyondCorp Enterprise (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kubernetes deploy-time security

A

Binary Authorization (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managed private CAs

A

Certificate Authority Service (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Find threats from security telemetry

A

Chronicle (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All assets, one place

A

Cloud Asset Inventory (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audit trails

A

Cloud Audit Logs (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classify and redact sensitive data

A

Cloud Data Loss Prevention (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

External keys you control/manage

A

Cloud EKM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware security module service

A

Cloud HSM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Resource access control

A

Cloud IAM (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Manage Users, devices, and apps

A

Cloud Identity (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity-based app access

A

Cloud Identity-Aware Proxy (Identity and Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hosted key management service

A

Cloud KMS (Identity and Security)

17
Q

Encrypt data in-use

A

Confidential Computing (Identity and Security)

18
Q

End-user attribute-based access control

A

Context-aware Access (Identity and Security)

19
Q

Scans for suspicious activity

A

Event threat detection (Identity and Security)

20
Q

Drop-in Authentication, Access-Management

A

Identity Platform (Identity and Security)

21
Q

Managed Microsoft Active Directory

A

Managed Service for Microsoft Active Directory (Identity and Security)

22
Q

Cloud project metadata management

A

Resource Manager (Identity and Security)

23
Q

Evaluate organization’s security posture

A

Risk Manager (Identity and Security)

24
Q

Store and manage secrets

A

Secret Manager (Identity and Security)

25
Q

Security management and data risk platform

A

Security Command Center (Identity and Security)

26
Q

Two-step key verification

A

Security Key Enforcement (Identity and Security)

27
Q

Hardened VMs

A

Shielded VMs (Identity and Security)

28
Q

Secure software supply chain

A

Software Delivery Shield (Identity and Security)

29
Q

Two-factor authentication (2FA) device

A

Titan Security Key (Identity and Security)

30
Q

VPC data constraints

A

VPC Service Controls (Identity and Security)

31
Q

Research/hunt for malware

A

VirusTotal (Identity and Security)

32
Q

App engine security scanner

A

Web Security Scanner (Identity and Security)

33
Q

Identifies web-app security vulnerabilities

A

We Security Scanner (Identity and Security)

34
Q

Protect website against bots

A

reCAPTCHA Enterprise (Identity and Security)