Which Cloud IAM roles for security auditors requiring visibility across all projects? A, Org viewer, project owner. B, Org viewer, project viewer. C, Org admin, project browser. Or D, Project owner, network admin. And the answer is B, Org viewer, project viewer. This solution gives read-only access across the entire company. The other options allow changes that should not be permitted. Dress4Win security has decided to standardize on AES256 for storage device encryption. Which strategy should be used with Compute Engine instances? So like SSDs rather than HDDs to ensure AES256 encryption. Use the linux dm-crypt tool for whole-disk encryption. Use the Customer Supplied Encryption Keys, CSEK. Use open SSL for AES256 file encryption. The answer is A, Select SSDs rather than HDD to ensure AES256 encryption. Selection of disk type determines the default method for whole-disk encryption. HDDs use AES128 and SDDs use AES256. In addition to the storage system level encryption described above, in most cases, data is also encrypted at the storage device level. With at least AES128 for hard disks HDD and AES256 for new solid state drives SSD. Using a separate device level key which is different than the key used to encrypt the data at the storage level. As older devices are replaced solely AES256 will be used for device level encryption.