New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Google Cloud Certified Security-Operations-Engineer Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A Google Security Operations (SecOps) detection rule is generating frequent false positive alerts. The rule was designed to detect suspicious Cloud Storage enumeration by triggering an alert whenever the storage.objects.list API operation is called using the api.operation UDM field. However, a legitimate backup automation tool that uses the same API, causing the rule to fire unnecessarily. You need to reduce these false positives from this trusted backup tool while still detecting potentially malicious usage. How should you modify the rule to improve its accuracy?

Options:

A.

Adjust the rule severity to low to deprioritize alerts from automation tools.


B.

Convert the rule into a multi-event rule that looks for repeated API calls across multiple buckets.


C.

Replace api.operation with api.service_name = "storage.googleapis.com" to narrow the detection scope.


D.

Add principal.user.email != "backup-bot@fcobaa.com" to the rule condition to exclude the automation account.


Expert Solution
Questions # 12:

You are investigating whether an advanced persistent threat (APT) actor has operated in your organization's environment undetected. You have received threat intelligence that includes:

    A SHA256 hash for a malicious DLL

    A known command and control (C2) domain

    A behavior pattern where rundll32.exe spawns powershell.exe with obfuscated arguments

Your Google Security Operations (SecOps) instance includes logs from EDR, DNS, and Windows Sysmon. However, you have recently discovered that process hashes are not reliably captured across all endpoints due to an inconsistent Sysmon configuration. You need to use Google SecOps to develop a detection mechanism that identifies the associated activities. What should you do?

Options:

A.

Use Google SecOps search to identify recent uses of rundll32.exe, and tag affected assets for watchlisting.


B.

Create a single-event YARA-L detection rule based on the file hash, and run the rule against historical and incoming telemetry to detect the DLL execution.


C.

Write a multi-event YARA-L detection rule that correlates the process relationship and hash, and run a retrohunt based on this rule.


D.

Build a data table that contains the hash and domain, and link the list to a high-frequency rule for near real-time alerting.


Expert Solution
Questions # 13:

You are conducting proactive threat hunting in your company's Google Cloud environment. You suspect that an attacker compromised a developer's credentials and is attempting to move laterally from a development Google Kubernetes Engine (GKE) cluster to critical production systems. You need to identify IoCs and prioritize investigative actions by using Google Cloud's security tools before analyzing raw logs in detail. What should you do next?

Options:

A.

In the Security Command Center (SCC) console, apply filters for the cluster and analyze the resulting aggregated findings' timeline and details for IoCs. Examine the attack path simulations associated with attack exposure scores to prioritize subsequent actions.


B.

Review threat intelligence feeds within Google Security Operations (SecOps), and enrich any anomalies with context on known IoCs, attacker tactics, techniques, and procedures (TTPs), and campaigns.


C.

Investigate Virtual Machine (VM) Threat Detection findings in Security Command Center (SCC). Filter for VM Threat Detection findings to target the Compute Engine instances that serve as the nodes for the cluster, and look for malware or rootkits on the nodes.


D.

Create a Google SecOps SOAR playbook that automatically isolates any GKE resources exhibiting unusual network connections to production environments and triggers an alert to the incident response team.


Expert Solution
Questions # 14:

You are developing a security strategy for your organization. You are planning to use Google Security Operations (SecOps) and Google Threat Intelligence (GTI). You need to enhance the detection and response across multi-cloud and on-premises systems. How should you integrate these products?

Choose 2 answers

Options:

A.

Ingest GTI IOCs into Google SecOps as security events.


B.

Ingest on-premises and cloud security logs into Google SecOps SIEM as events.


C.

Ingest on-premises and cloud security logs into Google SecOps SIEM as entities.


D.

Use Google SecOps SOAR integrations with GTI for event enrichment.


E.

Use Google SecOps SOAR integrations with GTI for entity enrichment.


Expert Solution
Questions # 15:

You are responsible for evaluating the level of effort required to integrate a new third-party endpoint detection tool with Google Security Operations (SecOps). Your organization's leadership wants to minimize customization for the new tool for faster deployment. You need to verify that the Google SecOps SOAR and SIEM support the expected workflows for the new third-party tool. You must recommend a tool to your leadership team as quickly as possible. What should you do?

Choose 2 answers

Options:

A.

Review the architecture of the tool to identify the cloud provider that hosts the tool.


B.

Review the documentation to identify if default parsers exist for the tool, and determine whether the logs are supported and able to be ingested.


C.

Identify the tool in the Google SecOps Marketplace, and verify support for the necessary actions in the workflow.


D.

Develop a custom integration that uses Python scripts and Cloud Run functions to forward logs and orchestrate actions between the third-party tool and Google SecOps.


E.

Configure a Pub/Sub topic to ingest raw logs from the third-party tool, and build custom YARA-L rules in Google SecOps to extract relevant security events.


Expert Solution
Questions # 16:

You are a security engineer at a managed security service provider (MSSP) that is onboarding to Google Security Operations (SecOps). You need to ensure that cases for each customer are logically separated. How should you configure this logical separation?

Options:

A.

In Google SecOps SOAR settings, create a role for each customer.


B.

In Google SecOps Playbooks, create a playbook for each customer.


C.

In Google SecOps SOAR settings, create a permissions group for each customer.


D.

In Google SecOps SOAR settings, create a new environment for each customer.


Expert Solution
Questions # 17:

You are a platform engineer at an organization that is migrating from a third-party SIEM product to Google Security Operations (SecOps). You previously manually exported context data from Active Directory (AD) and imported the data into your previous SIEM as a watchlist when there were changes in AD's user/asset context data. You want to improve this process using Google SecOps. What should you do?

Options:

A.

Ingest AD organizational context data as user/asset context to enrich user/asset information in your security events.


B.

Configure a Google SecOps SOAR integration for AD to enrich user/asset information in your security alerts.


C.

Create a data table that contains AD context data. Use the data table in your YARA-L rule to find user/asset data that can be correlated within each security event.


D.

Create a data table that contains the AD context data. Use the data table in your YARA-L rule to find user/asset information for each security event.


Expert Solution
Questions # 18:

You are responsible for identifying suspicious activity and security events in your organization's environment. You discover that some detection rules are generating false positives when the principal.ip field contains one or more IP addresses in the 192.168.2.0/24 subnet. You want to improve these detection rules using the principal.ip repeated field. What should you add to the YARA-L detection rules?

Options:

A.

net.ip_in_range_cidr(all $e.principal.ip, "192.168.2.0/24")


B.

net.ip_in_range_cidr(any $e.principal.ip, "192.168.2.0/24")


C.

not net.ip_in_range_cidr(all $e.principal.ip, "192.168.2.0/24")


D.

not net.ip_in_range_cidr(any $e.principal.ip, "192.168.2.0/24")


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions