<< Prev Question Next Question >>

Question 34/47

You are tasked with exporting and auditing security logs for login activity events for Google Cloud console and API calls that modify configurations to Google Cloud resources. Your export must meet the following requirements:
Export related logs for all projects in the Google Cloud organization.
Export logs in near real-time to an external SIEM.
What should you do? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (47q)
Question 1: You need to set up a Cloud interconnect connection between y...
Question 2: An organization is moving applications to Google Cloud while...
Question 3: A large e-retailer is moving to Google Cloud Platform with i...
Question 4: Your team wants to centrally manage GCP IAM permissions from...
Question 5: While migrating your organization's infrastructure to GCP, a...
Question 6: You need to implement an encryption at-rest strategy that re...
Question 7: A company is running their webshop on Google Kubernetes Engi...
Question 8: A customer's data science group wants to use Google Cloud Pl...
Question 9: An engineering team is launching a web application that will...
Question 10: You need to enable VPC Service Controls and allow changes to...
Question 11: A customer's internal security team must manage its own encr...
Question 12: Your company runs a website that will store PII on Google Cl...
Question 13: In an effort for your company messaging app to comply with F...
Question 14: Your company wants to determine what products they can build...
Question 15: An application running on a Compute Engine instance needs to...
Question 16: You are in charge of migrating a legacy application from you...
Question 17: A company is backing up application logs to a Cloud Storage ...
Question 18: In order to meet PCI DSS requirements, a customer wants to e...
Question 19: You are a security engineer at a finance company. Your organ...
Question 20: You are creating an internal App Engine application that nee...
Question 21: A company allows every employee to use Google Cloud Platform...
Question 22: You have been tasked with implementing external web applicat...
Question 23: A customer implements Cloud Identity-Aware Proxy for their E...
Question 24: A customer deploys an application to App Engine and needs to...
Question 25: An organization is evaluating the use of Google Cloud Platfo...
Question 26: Which international compliance standard provides guidelines ...
Question 27: You are responsible for protecting highly sensitive data in ...
Question 28: A company is backing up application logs to a Cloud Storage ...
Question 29: What are the steps to encrypt data using envelope encryption...
Question 30: Your team uses a service account to authenticate data transf...
Question 31: An employer wants to track how bonus compensations have chan...
Question 32: A customer is running an analytics workload on Google Cloud ...
Question 33: Your company is using GSuite and has developed an applicatio...
Question 34: You are tasked with exporting and auditing security logs for...
Question 35: For compliance reasons, an organization needs to ensure that...
Question 36: An organization is starting to move its infrastructure from ...
Question 37: A customer needs to launch a 3-tier internal web application...
Question 38: A company has redundant mail servers in different Google Clo...
Question 39: An office manager at your small startup company is responsib...
Question 40: Applications often require access to "secrets" - small piece...
Question 41: Your team needs to make sure that their backend database can...
Question 42: You want data on Compute Engine disks to be encrypted at res...
Question 43: A retail customer allows users to upload comments and produc...
Question 44: An organization adopts Google Cloud Platform (GCP) for appli...
Question 45: A customer deployed an application on Compute Engine that ta...
Question 46: As adoption of the Cloud Data Loss Prevention (DLP) API grow...
Question 47: In a shared security responsibility model for IaaS, which tw...