Choose the best description of the main goal of Cloud IAM.
Think about security and permissions in the cloud.
Cloud IAM is designed to manage user identities and their permissions to access cloud resources securely.
Select the option that is not typically part of Cloud IAM systems.
Consider what IAM manages directly versus what is handled by other cloud security features.
Data encryption at rest is a security feature but is not directly part of IAM, which focuses on identity and access permissions.
Consider a user who has two roles: one allows deleting files, the other denies deleting files. What is the effective permission?
Think about how deny permissions usually work in access control systems.
In most IAM systems, deny permissions take precedence over allow permissions to ensure security.
Identify the example that correctly applies the principle of least privilege.
Least privilege means giving only the minimum access needed.
The principle of least privilege limits user permissions to only what is necessary, reducing security risks.
Choose the best explanation for why MFA enhances security in cloud identity management.
Think about how MFA adds extra steps to verify identity.
MFA requires multiple proofs like a password plus a code from a phone, making it harder for attackers to gain access.