Q: 8
Veronica Lauren has an experience of 4 years as a cloud security engineer. Recently, she joined an IT
company as a senior cloud security engineer. In 2010, her organization became a victim of a
cybersecurity attack in which the attacker breached her organization's cloud security perimeter and
stole sensitive information. Since then, her organization started using Google cloud-based services
and migrated the organizational workload and data in the Google cloud environment. Veronica
would like to detect security breaches in her organization's cloud security perimeter. Which of the
following built-in service of Google Security Command Center can help Veronica in monitoring her
organization's cloud logging stream and collect logs from one or multiple projects to detect security
breaches such as the presence of malware, brute force SSH attempts, and cryptomining?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.