Google Associate Cloud Engineer

Google Associate Cloud Engineer

Get started today

Ultimate access to all questions.


Your company has engaged external auditors to review the security setup, specifically focusing on the users and roles configured. What is the most effective method for the auditors to examine these users and roles?