ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 86 - Professional Cloud Security Engineer discussion

Report
Export

You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.

What should you do?

A.
Query Data Access logs.
Answers
A.
Query Data Access logs.
B.
Query Admin Activity logs.
Answers
B.
Query Admin Activity logs.
C.
Query Access Transparency logs.
Answers
C.
Query Access Transparency logs.
D.
Query Stackdriver Monitoring Workspace.
Answers
D.
Query Stackdriver Monitoring Workspace.
Suggested answer: B

Explanation:

Admin activity logs are always created to log entries for API calls or other actions that modify the configuration or metadata of resources. For example, these logs record when users create VM instances or change Identity and Access Management permissions.

asked 18/09/2024
Michael Whitehouse
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first