Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 199 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 199
Topic #: 1
[All Professional Cloud Security Engineer Questions]

As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system so that you are alerted to possible intrusions.

Which logs should you analyze?

  • A. Data Access audit logs
  • B. Policy Denied audit logs
  • C. Cloud Identity user log events
  • D. Admin Activity audit logs
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
gcp4test
Highly Voted 1 year, 3 months ago
Selected Answer: A
The data_access log name only appears if there was traffic to your resource after you enabled Cloud Audit Logs for IAP. Click to expand the date and time of the access you want to review. Authorized access has a blue i icon. Unauthorized access has an orange !! icon. " https://cloud.google.com/iap/docs/audit-log-howto
upvoted 6 times
...
Mr_MIXER007
Most Recent 2 months, 3 weeks ago
Selected Answer: A
https://cloud.google.com/iap/docs/audit-log-howto#viewing_audit A
upvoted 1 times
...
3d9563b
4 months ago
Selected Answer: B
To effectively monitor and detect possible intrusions related to IAP-protected applications, focusing on Policy Denied audit logs provides the most relevant insights into access control and denial events. These logs help you track access violations and unauthorized attempts, aligning with your zero trust strategy and enabling timely alerts in your SIEM system.
upvoted 1 times
...
jujanoso
4 months, 2 weeks ago
Selected Answer: B
B. Policy Denied audit logs can show when unauthorized users or devices tried to access protected applications and were blocked, which is crucial for identifying and responding to threats. As part of a zero trust strategy, leveraging Identity-Aware Proxy (IAP) involves closely monitoring and analyzing logs to detect potential intrusions and unauthorized activities.
upvoted 1 times
...
glb2
8 months, 1 week ago
Selected Answer: B
B. Policy Denied audit logs: These logs contain records of access attempts that were denied by IAP policies. Analyzing these logs can help identify unauthorized access attempts and potential intrusion attempts blocked by IAP.
upvoted 2 times
...
desertlotus1211
9 months, 2 weeks ago
Answer is B
upvoted 2 times
...
cyberpunk21
1 year, 3 months ago
Selected Answer: A
A is fire
upvoted 2 times
...
Mithung30
1 year, 3 months ago
Selected Answer: A
https://cloud.google.com/iap/docs/audit-log-howto#viewing_audit
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...