Recall & Review
beginner
What is the principle of least privilege in cloud security?
It means giving users and services only the minimum access they need to do their job, nothing more. This reduces the risk of accidental or malicious damage.
Click to reveal answer
beginner
Why should you enable multi-factor authentication (MFA) for your cloud accounts?
MFA adds an extra step to verify your identity, like a code from your phone, making it much harder for attackers to access your account even if they know your password.
Click to reveal answer
intermediate
What is the purpose of using service accounts in GCP?
Service accounts let applications or virtual machines securely access other cloud services with specific permissions, instead of using user credentials.Click to reveal answer
intermediate
How does enabling audit logs help improve cloud security?
Audit logs record who did what and when in your cloud environment. This helps detect suspicious activity and investigate security incidents.
Click to reveal answer
beginner
What is the benefit of encrypting data at rest and in transit?
Encryption scrambles data so only authorized users can read it. This protects sensitive information from being stolen or seen by attackers.
Click to reveal answer
Which practice limits user access to only what is necessary?
✗ Incorrect
The principle of least privilege restricts access rights for users to the bare minimum needed.
What does enabling multi-factor authentication protect against?
✗ Incorrect
MFA protects accounts even if passwords are stolen by requiring an additional verification step.
What is a service account used for in GCP?
✗ Incorrect
Service accounts provide identities for applications to access cloud resources with specific permissions.
Why are audit logs important in cloud security?
✗ Incorrect
Audit logs help track and investigate activities to detect security issues.
Encrypting data in transit means:
✗ Incorrect
Encryption in transit protects data from being intercepted during transfer.
Explain the key security best practices to protect cloud resources in GCP.
Think about access control, identity verification, monitoring, and data protection.
You got /5 concepts.
Describe how audit logs and encryption work together to improve cloud security.
Consider monitoring and protecting data as two layers of defense.
You got /4 concepts.