Careers in Cloud - Cyber Security Analyst Return to playlist Fill-in-the-blanks Enter one or more words to complete the sentence. In Drive, all files undergo a ___ scan prior to downloading or sharing. Google Cloud allows you to manage access to resources, and assign permissions to users and services so that they can access those resources—all made possible through a unified system known as ___ . Cloud Identity and Access Management Google Cloud Directory Sync Filestore Machine learning The use of a physical security key for two-factor verification helps protect users from phishing because ___. it comes with antivirus software most hackers are remote Chromebooks need a security key to work it holds the data Fill-in-the-blanks Enter one or more words to complete the sentence. To prevent spoofing, you can verify a user’s identity using ___ verified signed assertions. Fill-in-the-blanks Enter one or more words to complete the sentence. ___ ___ helps you manage and analyze your cloud data without introducing additional risk to your organization. You ___ delete keys or key rings in Cloud Key Management Service. can can't must should Submit answers error_outline An error occurred when grading the quiz. Try again later.