ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 19 - 312-40 discussion

Report
Export

Veronica Lauren has an experience of 4 years as a cloud security engineer. Recently, she joined an IT company as a senior cloud security engineer. In 2010, her organization became a victim of a cybersecurity attack in which the attacker breached her organization's cloud security perimeter and stole sensitive information. Since then, her organization started using Google cloud-based services and migrated the organizational workload and data in the Google cloud environment. Veronica would like to detect security breaches in her organization's cloud security perimeter. Which of the following built-in service of Google Security Command Center can help Veronica in monitoring her organization's cloud logging stream and collect logs from one or multiple projects to detect security breaches such as the presence of malware, brute force SSH attempts, and cryptomining?

A.
Event Threat Detection
Answers
A.
Event Threat Detection
B.
Web Security Scanner
Answers
B.
Web Security Scanner
C.
Container Threat Detection
Answers
C.
Container Threat Detection
D.
Security Health Analytics
Answers
D.
Security Health Analytics
Suggested answer: A

Explanation:

To monitor the organization's cloud logging stream and detect security breaches, Veronica Lauren can utilize the Event Threat Detection service within Google Security Command Center.

1.Event Threat Detection: This built-in service of Google Security Command Center is designed to monitor cloud logs across multiple projects and detect threats such as malware, brute force SSH attempts, and cryptomining1. It uses threat intelligence and advanced analytics to identify and alert on suspicious activity in real time.

1.Functionality:

oLog Analysis: Event Threat Detection continuously analyzes the logs generated by Google Cloud services.

oThreat Detection: It automatically detects the presence of threats like malware, SSH brute force attempts, and cryptomining activities.

oAlerts and Findings: When a potential threat is detected, Event Threat Detection issues findings that are integrated into the Security Command Center dashboard for further investigation.

1.Why Not the Others?:

oWeb Security Scanner: This service is primarily used for identifying security vulnerabilities in web applications hosted on Google Cloud, not for monitoring logs for security breaches.

oContainer Threat Detection: While this service is useful for detecting runtime threats in containers, it does not provide the broad log analysis capabilities that Event Threat Detection offers.

oSecurity Health Analytics: This service provides automated security scanning to detect misconfigurations and compliance violations in Google Cloud resources, but it is not specifically focused on the real-time threat detection provided by Event Threat Detection.

Security Command Center overview | Google Cloud1.

asked 18/09/2024
Simone Somacal
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first