Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Security-Operations-Engineer Question # 12 Topic 2 Discussion

Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Security-Operations-Engineer Question # 12 Topic 2 Discussion

Security-Operations-Engineer Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

You are using Google Security Operations (SecOps) to investigate suspicious activity linked to a specific user. You want to identify all assets the user has interacted with over the past seven days to assess potential impact. You need to understand the user's relationships to endpoints, service accounts, and cloud resources. How should you identify user-to-asset relationships in Google SecOps?


A.

Query for hostnames in UDM Search and filter the results by user.


B.

Run a retrohunt to find rule matches triggered by the user.


C.

Use the Raw Log Scan view to group events by asset ID.


D.

Generate an ingestion report to identify sources where the user appeared in the last seven days.


Get Premium Security-Operations-Engineer Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.