An employee was terminated, but their access to Google Cloud was not removed until 2 weeks later. You need to find out if this employee accessed any sensitive customer information after their termination. What should you do?
A.
View System Event Logs in Cloud Logging. Search for the user's email as the principal.
B.
View System Event Logs in Cloud Logging. Search for the service account associated with the user.
C.
View Data Access audit logs in Cloud Logging. Search for the user's email as the principal.
D.
View the Admin Activity log in Cloud Logging. Search for the service account associated with the user.
Guys, do you know which answers are the correct answers on this website? The website's answers or the most voted ones? I'm preparing for the exam and I need a quick and certain response. Thank you
C. View Data Access audit logs in Cloud Logging. Search for the user's email as the principal.
Data Access audit logs provide detailed information about accesses to your Google Cloud resources. By searching for the terminated employee's email address as the principal in the Data Access audit logs, you can track their access to sensitive customer information after their termination. This approach allows you to specifically focus on data access, which is crucial for identifying any unauthorized or suspicious activities related to customer data.
I think option C is correct :
Data Access audit logs contain API calls that read the configuration or metadata of resources, as well as user-driven API calls that create, modify, or read user-provided resource data.
C. View Data Access audit logs in Cloud Logging. Search for the user's email as the principal.
Data Access audit logs record all activity related to accessing or modifying data, including reading, writing, and deleting operations. By searching for the terminated employee's email as the principal, you can see if they accessed any sensitive customer information after their termination. System Event Logs and Admin Activity logs may not have the details of the data accessed, so Data Access audit logs are the most appropriate option in this scenario.
C is the correct answer. We are trying to find out if any sensitive data was accessed. Data access logs are the only logs that show this. C is the only option that mentions data access logs.
It should be C User activity generally come under audit logs
upvoted 3 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
shubhi_1
7 months, 1 week agoidk_4
10 months, 1 week agoBuenaCloudDE
4 months, 2 weeks agoBAofBK
1 year agocooldude26
1 year, 1 month agoCaptain1212
1 year, 2 months agosabrinakloud
1 year, 7 months agoBobbybash
1 year, 9 months agomrvergara
1 year, 10 months agoCornholio_LMC
2 years, 2 months agoabirroy
2 years, 3 months agoRutu_98
2 years, 6 months agoakshaychavan7
2 years, 6 months agobigbenben
2 years, 6 months agorsuresh27
2 years, 7 months agortnk22
2 years, 7 months agoamrith501
2 years, 7 months ago