Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Google Cloud Certified Security-Operations-Engineer Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You scheduled a Google Security Operations (SecOps) report to export results to a BigQuery dataset in your Google Cloud project. The report executes successfully in Google SecOps, but no data appears in the dataset. You confirmed that the dataset exists. How should you address this export failure?

Options:

A.

Grant the Google SecOps service account the roles/iam.serviceAccountUser IAM role to itself.


B.

Set a retention period for the BigQuery export.


C.

Grant the user account that scheduled the report the roles/bigquery.dataEditor IAM role on the project.


D.

Grant the Google SecOps service account the roles/bigquery.dataEditor IAM role on the dataset.


Expert Solution
Questions # 12:

You are using Google Security Operations (SecOps) to investigate suspicious activity linked to a specific user. You want to identify all assets the user has interacted with over the past seven days to assess potential impact. You need to understand the user's relationships to endpoints, service accounts, and cloud resources. How should you identify user-to-asset relationships in Google SecOps?

Options:

A.

Query for hostnames in UDM Search and filter the results by user.


B.

Run a retrohunt to find rule matches triggered by the user.


C.

Use the Raw Log Scan view to group events by asset ID.


D.

Generate an ingestion report to identify sources where the user appeared in the last seven days.


Expert Solution
Questions # 13:

Your organization uses Google Security Operations (SecOps) for security analysis and investigation. Your organization has decided that all security cases related to Data Loss Prevention (DLP) events must be categorized with a defined root cause specific to one of five DLP event types when the case is closed in Google SecOps. How should you achieve this?

Options:

A.

Customize the Case Name format to include the DLP event type.


B.

Create case tags in Google SecOps SOAR where each tag contains a unique definition of each of the five DLP event types, and have analysts assign them to cases manually.


C.

Customize the Close Case dialog and add the five DLP event types as root cause options.


D.

Create a Google SecOps SOAR playbook that automatically assigns case tags where each tag contains the unique definition of one of the five DLP event types.


Expert Solution
Questions # 14:

Your organization plans to ingest logs from an on-premises MySQL database as a new log source into its Google Security Operations (SecOps) instance. You need to create a solution that minimizes effort. What should you do?

Options:

A.

Configure and deploy a Bindplane collection agent


B.

Configure a third-party API feed in Google SecOps.


C.

Configure direct ingestion from your Google Cloud organization.


D.

Configure and deploy a Google SecOps forwarder.


Expert Solution
Questions # 15:

Your company has deployed two on-premises firewalls. You need to configure the firewalls to send logs to Google Security Operations (SecOps) using Syslog. What should you do?

Options:

A.

Deploy a Google Ops Agent on your on-premises environment, and set the agent as the Syslog destination.


B.

Pull the firewall logs by using a Google SecOps feed integration.


C.

Deploy a third-party agent (e.g., Bindplane, NXLog) on your on-premises environment, and set the agent as the Syslog destination.


D.

Set the Google SecOps URL instance as the Syslog destination.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions