You want to evaluate GCP for PCI compliance. You need to identify Google's inherent controls.Which document should you review to find the information?
Your company's chief information security officer (CISO) is requiring business data to be stored in specific locations due to regulatory requirements that affect the company's global expansion plans. After working on a plan to implement this requirement, you determine the following:The services in scope are included in the Google Cloud data residency requirements.The business data remains within specific locations under the same organization.The folder structure can contain multiple data residency locations.The projects are aligned to specific locations.You plan to use the Resource Location Restriction organization policy constraint with very granular control. At which level in the hierarchy should you set the constraint?
You are using Security Command Center (SCC) to protect your workloads and receive alerts for suspected security breaches at your company. You need to detect cryptocurrency mining software.Which SCC service should you use?
You want to use the gcloud command-line tool to authenticate using a third-party single sign-on (SSO) SAML identity provider. Which options are necessary to ensure that authentication is supported by the third-party identity provider (IdP)? (Choose two.)
A company's application is deployed with a user-managed Service Account key. You want to use Google- recommended practices to rotate the key.What should you do?