Careers in Cloud - Cyber Security Analyst

  1. Fill-in-the-blanks

    Enter one or more words to complete the sentence.

    In Drive, all files undergo a ___ scan prior to downloading or sharing.

  2. Google Cloud allows you to manage access to resources, and assign permissions to users and services so that they can access those resources—all made possible through a unified system known as ___ .
  3. The use of a physical security key for two-factor verification helps protect users from phishing because ___.
  4. Fill-in-the-blanks

    Enter one or more words to complete the sentence.

    To prevent spoofing, you can verify a user’s identity using ___ verified signed assertions.

  5. Fill-in-the-blanks

    Enter one or more words to complete the sentence.

    ___ ___ helps you manage and analyze your cloud data without introducing additional risk to your organization.

  6. You ___ delete keys or key rings in Cloud Key Management Service.