Understanding Google Cloud Security and Operations
02. Security in the cloud
What are the three components of Google Clouds defense-in-depth data security design? Select the correct answer.
You have received an email that says the following: “We have identified that your account is vulnerable. Click this link to change your security settings.” What cybersecurity risks do you need to consider before clicking on the link? Select two correct answers.
What Google Cloud security layer does “strong authentication for data access” relate to? Select the correct answer.
An Identity Access Management policy, or IAM policy, is made of three parts. What are they? Select the correct answer.
What is Google Cloud’s principle for granting access to users? Select the correct answer.