Module 4 of Business Transformation with Google Cloud
Maria has recently been appointed as the Chief Security Officer of a bank. The bank is in the process of migrating some of its files to the cloud, and her role is to ensure that it does so safely and securely. She has compiled a list of actions that she needs to take. Which of the following actions would help keep the bank’s files secure? Select the correct answer.
You have received an email that says the following: “We have identified that your account is vulnerable. Click this link to change your security settings.”
Which of the current cybersecurity risks do you need to consider before clicking on the link? Select two correct answers.
Fred is responsible for the privacy, security, and compliance programs for a pharmaceutical company. His company has recently migrated to Google Cloud, and some of their company and customer data is now stored there.
Fred has been reviewing Google Cloud’s privacy and security controls and knows that every user must be set up with strong authentication to gain access to company data.
Which of the following Google Cloud security layers does “strong authentication for data access” relate to? Select the correct answer.
Anita is information security manager at a luxury brand. The brand has recently had some of its IP stolen by a competitor. Now Anita’s been tasked with tightening the business’s security by exploring cloud service providers.
After selecting Google Cloud, she safely moved part of key company files to the cloud. As part of Google Cloud’s recommendation to build a Shared Responsibility Model, what would be Anita’s best next step? Select the correct answer.
Fernando is the Vice President of an insurance brokerage firm. He is considering migrating his firm to the cloud but has some concerns about how to do this while remaining compliant with the controls his firm is subject to.
Which of the following questions would be the most valuable for him to ask his prospective cloud provider in order to ensure that his company data privacy and security measures remain compliant with the required controls in his industry? Select two correct answers.