Identity and Security (Policy and compliance tools) Flashcards

1
Q

Access Context Manager

A

Fine-grained, attribute based access-control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Transparency

A

Audit cloud provider access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assured Workloads

A

Workload compliance controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BeyondCorp Enterprise

A

Zero trust secure access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Binary Authorization

A

Kubernetes deploy-time security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate Authority Service

A

Managed private CAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chronicle

A

Find threats from security telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Asset Inventory

A

All assets, one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Audit Logs

A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Data Loss Prevention

A

Classify and redact sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud EKM

A

External Keys you control/manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud HSM

A

Hardware security module service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud IAM

A

Resource access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Identity

A

Manage users, devices, & apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Identity-Aware Proxy

A

Identity-based app access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud KMS

A

Hosted key management service

17
Q

Confidential Computing

A

Encrypt data in-use

18
Q

Context-aware Access

A

End-user attribute-based access control

19
Q

Event Threat Detection

A

Scans for suspicious activity

20
Q

Identity Platform

A

Drop-in Authentication, Access-Management

21
Q

Managed Service for Microsoft Active Directory

A

Managed Microsoft Active Directory

22
Q

Resource Manager

A

Cloud project metadata management

23
Q

Risk Manager

A

Evaluate organization’s security posture

24
Q

Secret Manager

A

Store and manage secrets

25
Security Command Center
Security management and data risk platform
26
Security Key Enforcement
Two-step key verification
27
Shielded VMs
Hardened VMs (secure)
28
Titan Security Key
Two-factor authentication (2FA) device
29
VPC Service Controls
VPC data constraints
30
VirusTotal
Research/hunt for malware
31
Cloud Security Scanner
App engine security scanner
32
reCAPTCHA Enterprise
Protect website against bots
32
Web Security Scanner
Identifies web-app security vulnerabilities