Secure Data Transfer
Threat Detection
Misconfigurations & Health
Controlled Access
Workload Security Mix
100

This AWS service uses physical devices to securely transfer petabytes of workload data into the cloud.

What is AWS Snowball?

100

This GCP service detects brute-force SSH, malware, and cryptomining in workload logs.

What is Event Threat Detection? 

100

This SCC scanner flags open storage buckets, VMs without SSL, and exposed Web UIs.

What is Security Health Analytics?

100

These provide limited-time access to Google Cloud Storage objects without requiring an account.

What are Signed URLs? 

100

AWS Snowball secures data in transit, while GCP Event Threat Detection secures this.

What is data in use (log activity/operations)?

200

AWS Snowball improves security by encrypting data at rest using this.

What are AWS Key Management Service (KMS) keys?

200

Event Threat Detection is part of this broader GCP platform.

What is Google Security Command Center? 

200

Security Health Analytics detects vulnerabilities across these four resource types.

What are VMs, containers, networks, and storage?

200

Signed URLs are often used to grant time-limited access for this common use case.

What is file download or upload?

200

Event Threat Detection and Security Health Analytics are both part of this GCP suite.

What is Google Security Command Center?

300

After workloads are migrated, AWS securely wipes Snowball devices using this erasure method.

What is NIST-compliant software erasure? 

300

Event Threat Detection relies on this type of analytics to detect anomalies.

What is behavioral/log analytics?

300

Security Health Analytics provides findings that can be used for these two functions.

What are compliance checks and remediation planning?

300

Signed URLs are an example of this type of IAM delegation mechanism.

What is delegated or temporary access control?

300

Signed URLs help secure app workloads by limiting access, while Security Health Analytics focuses on these.

What are misconfigurations and vulnerabilities?

400

Using Snowball avoids these two major bottlenecks for workload migration.

What are high network costs and long transfer times?

400

True or False: Event Threat Detection requires third-party integration to analyze logs.

What is False?

400

Security Health Analytics checks IAM policies to ensure alignment with this principle.

What is the principle of least privilege?

400

Which parameter in a Signed URL specifies how long the access remains valid?

What is the expiration time (or TTL)?

400

Event Threat Detection identifies brute-force attacks, while Signed URLs prevent this kind of risk.

What is unauthorized access/sharing of workload resources?

500

Snowball is often a stepping stone to this larger-scale AWS data transfer service.

What is AWS Snowmobile? RETIRED 

500

Event Threat Detection is especially useful for detecting suspicious activity across these multiple environments.

What are multi-project Google Cloud environments?

500

Which GCP role most benefits from Security Health Analytics findings?

What is the cloud security engineer?

500

Signed URLs are often compared to this AWS equivalent feature.

What are AWS S3 pre-signed URLs?

500

Together, Snowball, Event Threat Detection, Security Health Analytics, and Signed URLs secure workloads across these three lifecycle phases.

What are migration, monitoring, and access control?