Q: 1
Your organization is a Google Security Operations (SecOps) customer. The compliance team requires
a weekly export of case resolutions and SLA metrics of high and critical severity cases over the past
week. The compliance team's post-processing scripts require this data to be formatted as tabular
data in CSV files, zipped, and delivered to their email each Monday morning. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
You received an alert from Container Threat Detection that an added binary has been executed in a
business critical workload. You need to investigate and respond to this incident. What should you do?
Choose 2 answers
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Your organization has recently onboarded to Google Cloud with Security Command Center Enterprise
(SCCE) and is now integrating it with your organization's SOC. You want to automate the response
process within SCCE and integrate with the existing SOC ticketing system. You want to use the most
efficient solution. How should you implement this functionality?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
You are an incident responder at your organization using Google Security Operations (SecOps) for
monitoring and investigation. You discover that a critical production server, which handles financial
transactions, shows signs of unauthorized file changes and network scanning from a suspicious IP
address. You suspect that persistence mechanisms may have been installed. You need to use Google
SecOps to immediately contain the threat while ensuring that forensic data remains available for
investigation. What should you do first?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
You have been tasked with creating a YARA-L detection rule in Google Security Operations (SecOps).
The rule should identify when an internal host initiates a network connection to an external IP
address that the Applied Threat Intelligence Fusion Feed associates with indicators attributed to a
specific Advanced Persistent Threat 41 (APT41) threat group. You need to ensure that the external IP
address is flagged if it has a documented relationship to other APT41 indicators within the Fusion
Feed. How should you configure this YARA-L rule?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
You work for an organization that uses Security Command Center (SCC) with Event Threat Detection
(ETD) enabled. You need to enable ETD detections for data exfiltration attempts from designated
sensitive Cloud Storage buckets and BigQuery datasets. You want to minimize Cloud Logging costs.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
You are ingesting and parsing logs from an SSO provider and an on-premises appliance using Google
Security Operations (SecOps). Users are tagged as "restricted" by an internal process. Restrictions last
five days from the most recent flagging time. You need to create a rule to detect when restricted
users log into the appliance. Your solution must be quickly implemented and easily maintained.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Your organization uses Cloud Identity as their identity provider (IdP) and is a Google Security
Operations (SecOps) customer. You need to grant a group of users access to the Google SecOps
instance with read-only access to all resources, including detection engine rules. How should this be
configured?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
You are investigating whether an advanced persistent threat (APT) actor has operated in your
organization's environment undetected. You have received threat intelligence that includes:
A SHA256 hash for a malicious DLL
A known command and control (C2) domain
A behavior pattern where rundll32.exe spawns powershell.exe with obfuscated arguments
Your Google Security Operations (SecOps) instance includes logs from EDR, DNS, and Windows
Sysmon. However, you have recently discovered that process hashes are not reliably captured across
all endpoints due to an inconsistent Sysmon configuration. You need to use Google SecOps to
develop a detection mechanism that identifies the associated activities. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
You have a custom-built YARA-L rule in Google Security Operations (SecOps) correlating observed IP
addresses in network and EDR logs against threat intelligence findings ingested from a Malware
Information Sharing Platform (MISP) over a 2-minute time window. Your company's SOC reported
that the rule generates too many false positives. You want to reduce the number of false positives
generated by the rule while continuing to use threat intelligence.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2