Q: 11
You are implementing Google Security Operations (SecOps) with multiple log sources. You want to
closely monitor the health of the ingestion pipeline's forwarders and collection agents, and detect
silent sources within five minutes. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
You need to augment your organization's existing Security Command Center (SCC) implementation
with additional detectors. You have a list of known IoCs and would like to include external signals for
this capability to ensure broad detection coverage. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
You are writing a Google Security Operations (SecOps) SOAR playbook that uses the VirusTotal v3
integration to look up a URL that was reported by a threat hunter in an email. You need to use the
results to make a preliminary recommendation on the maliciousness of the URL and set the severity
of the alert based on the output. What should you do?
Choose 2 answers
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Your company has deployed two on-premises firewalls. You need to configure the firewalls to send
logs to Google Security Operations (SecOps) using Syslog. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
You work for an organization that operates an ecommerce platform. You have identified a remote
shell on your company's web host. The existing incident response playbook is outdated and lacks
specific procedures for handling this attack. You want to create a new, functional playbook that can
be deployed as soon as possible by junior analysts. You plan to use available tools in Google Security
Operations (SecOps) to streamline the playbook creation process. What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2