Identity and Security (Policy and compliance tools) Flashcards

1
Q

Access Context Manager

A

Fine-grained, attribute based access-control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Transparency

A

Audit cloud provider access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assured Workloads

A

Workload compliance controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BeyondCorp Enterprise

A

Zero trust secure access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Binary Authorization

A

Kubernetes deploy-time security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate Authority Service

A

Managed private CAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chronicle

A

Find threats from security telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Asset Inventory

A

All assets, one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Audit Logs

A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Data Loss Prevention

A

Classify and redact sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud EKM

A

External Keys you control/manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud HSM

A

Hardware security module service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud IAM

A

Resource access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Identity

A

Manage users, devices, & apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Identity-Aware Proxy

A

Identity-based app access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud KMS

A

Hosted key management service

17
Q

Confidential Computing

A

Encrypt data in-use

18
Q

Context-aware Access

A

End-user attribute-based access control

19
Q

Event Threat Detection

A

Scans for suspicious activity

20
Q

Identity Platform

A

Drop-in Authentication, Access-Management

21
Q

Managed Service for Microsoft Active Directory

A

Managed Microsoft Active Directory

22
Q

Resource Manager

A

Cloud project metadata management

23
Q

Risk Manager

A

Evaluate organization’s security posture

24
Q

Secret Manager

A

Store and manage secrets

25
Q

Security Command Center

A

Security management and data risk platform

26
Q

Security Key Enforcement

A

Two-step key verification

27
Q

Shielded VMs

A

Hardened VMs (secure)

28
Q

Titan Security Key

A

Two-factor authentication (2FA) device

29
Q

VPC Service Controls

A

VPC data constraints

30
Q

VirusTotal

A

Research/hunt for malware

31
Q

Cloud Security Scanner

A

App engine security scanner

32
Q

reCAPTCHA Enterprise

A

Protect website against bots

32
Q

Web Security Scanner

A

Identifies web-app security vulnerabilities