0
0
GCPcloud~5 mins

Security best practices in GCP - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the principle of least privilege in cloud security?
It means giving users and services only the minimum access they need to do their job, nothing more. This reduces the risk of accidental or malicious damage.
Click to reveal answer
beginner
Why should you enable multi-factor authentication (MFA) for your cloud accounts?
MFA adds an extra step to verify your identity, like a code from your phone, making it much harder for attackers to access your account even if they know your password.
Click to reveal answer
intermediate
What is the purpose of using service accounts in GCP?
Service accounts let applications or virtual machines securely access other cloud services with specific permissions, instead of using user credentials.
Click to reveal answer
intermediate
How does enabling audit logs help improve cloud security?
Audit logs record who did what and when in your cloud environment. This helps detect suspicious activity and investigate security incidents.
Click to reveal answer
beginner
What is the benefit of encrypting data at rest and in transit?
Encryption scrambles data so only authorized users can read it. This protects sensitive information from being stolen or seen by attackers.
Click to reveal answer
Which practice limits user access to only what is necessary?
AAudit logging
BMulti-factor authentication
CPrinciple of least privilege
DData encryption
What does enabling multi-factor authentication protect against?
APassword theft
BData encryption
CAudit log creation
DService account misuse
What is a service account used for in GCP?
ATo allow applications to access cloud services securely
BTo store user passwords
CTo encrypt data at rest
DTo monitor network traffic
Why are audit logs important in cloud security?
AThey provide multi-factor authentication
BThey encrypt data
CThey restrict user access
DThey record user actions for security monitoring
Encrypting data in transit means:
ALogging user actions
BProtecting data while it moves between systems
CLimiting user access
DStoring data on a hard drive
Explain the key security best practices to protect cloud resources in GCP.
Think about access control, identity verification, monitoring, and data protection.
You got /5 concepts.
    Describe how audit logs and encryption work together to improve cloud security.
    Consider monitoring and protecting data as two layers of defense.
    You got /4 concepts.