This VMware feature allows a virtual machine to directly access a SAN LUN for high-performance workloads.
What is Raw Device Mapping (RDM)?
To protect against man-in-the-middle attacks, this Amazon Redshift parameter must be enabled.
What is require_ssl?
Azure AD Privileged Identity Management ensures consistency in these assignments across subscriptions.
What are role assignments?
his Azure service securely stores and manages cryptographic keys, secrets, and certificate
What is Azure Key Vault?
Azure Information Protection (AIP) uses these to classify and protect documents and emails.
What are labels?
This secure deletion method works by destroying encryption keys, making encrypted data unreadable.
What is Crypto-Shredding?
Google Cloud SQL ensures high availability by deploying databases across these.
What are multiple zones/regions?
This Azure security feature locks down access to VMs by requiring requests before opening ports.
What is Just-In-Time (JIT) VM Access?
Azure Key Vault supports controlling access to secrets using this identity service.
What is Azure Active Directory?
AIP protects sensitive documents by combining these two controls.
What are encryption and access policies?
Google Cloud Storage bucket names must follow this rule regarding letter case.
What is all lowercase letters only?
o boost MySQL performance in GCP, you can do this to persistent SSDs without downtime.
What is resize the SSD disk?
PIM helps enforce least privilege by requiring this for elevated role use.
What is just-in-time activation/approval?
Key Vault centralizes management to reduce reliance on this insecure practice.
What is hardcoding credentials/secrets?
Azure Application Gateway distributes traffic to backend VMs based on these.
What are HTTP request attributes?
This Azure service tier is best for rarely accessed medical imaging data like MRIs and X-rays.
What is Azure Archive Storage?
Redshift connections encrypted with SSL ensure protection of data during this state.
What is data in transit?
Azure JIT VM Access rules are created here to block or allow traffic.
What are Azure Firewalls or NSGs?
Keys managed in Azure Key Vault can be configured to meet this compliance requirement.
What is FIPS 140-2 compliance?
AIP allows admins to revoke this even after a document has been shared externally.
What is access to the document?
Azure JIT VM Access improves security by controlling this type of inbound activity.
What is inbound traffic to VMs?
This GCP feature improves MySQL responsiveness by dynamically adjusting storage throughput.
What is persistent disk resizing/tuning?
Azure PIM adds this type of authentication layer before role activation.
What is multi-factor authentication (MFA)?
Azure Key Vault allows the secure lifecycle management of secrets through this feature.
What are access policies with rotation/expiration?
Application Gateway provides this security benefit by acting as a web traffic load balancer.
What is enhanced availability and protection against traffic-based attacks?