ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 65 - Professional Google Workspace Administrator discussion

Report
Export

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

A.
Use the login audit report to export all suspicious login details for analysis.
Answers
A.
Use the login audit report to export all suspicious login details for analysis.
B.
Create a custom dashboard with the security investigation tool showing suspicious logins.
Answers
B.
Create a custom dashboard with the security investigation tool showing suspicious logins.
C.
Use the account activity report to export all suspicious login details for analysis.
Answers
C.
Use the account activity report to export all suspicious login details for analysis.
D.
Create a custom query in BigQuery showing all suspicious login details.
Answers
D.
Create a custom query in BigQuery showing all suspicious login details.
Suggested answer: A

Explanation:

Access the Admin Console:

In the Google Workspace Admin console, navigate to 'Reports' > 'Audit' > 'Login'.

Generate a Login Audit Report:

Customize the report to include details about suspicious login attempts.

Set the time frame to the past year and filter the results to show only suspicious logins.

Export the Report:

Export the login audit report in a suitable format (e.g., CSV) for further analysis.

Ensure the report includes user account details and the number of suspicious login attempts for each account.

Analyze the Data:

Review the exported data to identify patterns and determine how frequently suspicious login attempts occur within the organization.

Provide the analysis to the CISO with the required details for each user account.

Google Workspace Admin Help: View and analyze login audit logs

asked 18/09/2024
George Sanchez
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first