
Answer-first summary for fast verification
Answer: Explain Google's shared responsibility model. Focus the configuration review on Identity and Access Management (IAM) permissions, secure data upload/download procedures, and monitoring logs for any potential malicious activity.
Option C is the correct answer because it directly addresses the core requirement of explaining security responsibilities for a managed AI service on Google Cloud. It correctly references Google's shared responsibility model, which is fundamental for understanding security division between Google (infrastructure security) and the customer (data, IAM, application security). The focus on IAM permissions, secure data handling procedures, and monitoring aligns with best practices for securing AI models where the customer retains responsibility for access control, data protection, and threat detection. Option A incorrectly suggests PaaS transfers all security concerns to Google, which misrepresents the shared responsibility model. Option B focuses too narrowly on code security and team access control, missing the broader security responsibility explanation needed for stakeholders. Option D emphasizes custom network firewalls and vulnerability scanning, which are more relevant to infrastructure-level security that Google manages in a managed service context.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization has an operational image classification model running on a managed AI service on Google Cloud. During a configuration review with stakeholders, you need to explain the security responsibilities for the model. What should you do?
A
Explain that using platform-as-a-service (PaaS) transfers security concerns to Google. Describe the need for strict API usage limits to protect against unexpected usage and billing spikes.
B
Explain the security aspects of the code that transforms user-uploaded images using Google's service. Define Cloud IAM for fine-grained access control within the development team.
C
Explain Google's shared responsibility model. Focus the configuration review on Identity and Access Management (IAM) permissions, secure data upload/download procedures, and monitoring logs for any potential malicious activity.
D
Explain the development of custom network firewalls around the image classification service for deep intrusion detection and prevention. Describe vulnerability scanning tools for known vulnerabilities.
No comments yet.