New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmasmnth

During a proactive threat hunting exercise, you discover that a critical production project has an...

During a proactive threat hunting exercise, you discover that a critical production project has an external identity with a highly privileged IAM role. You suspect that this is part of a larger intrusion, and it is unknown how long this identity has had access. All logs are enabled and routed to a centralized organization-level Cloud Logging bucket, and historical logs have been exported to BigQuery datasets.

You need to determine whether any actions were taken by this external identity in your environment.

What should you do?

A.

Analyze IAM recommender insights and Security Command Center (SCC) findings associated with the external identity.

B.

Use Policy Analyzer to identify the resources that are accessible by the external identity. Examine the logs related to these resources in the centralized Cloud Logging bucket and the BigQuery dataset.

C.

Execute queries against the centralized Cloud Logging bucket and the BigQuery dataset to filter for logs where the principal email matches the external identity.

D.

Analyze VPC Flow Logs exported to BigQuery, and correlate source IP addresses with potential login events for the external identity.

Google Security-Operations-Engineer Summary

  • Vendor: Google
  • Product: Security-Operations-Engineer
  • Update on: Dec 19, 2025
  • Questions: 60
Price: $52.5  $149.99
Buy Now Security-Operations-Engineer PDF + Testing Engine Pack

Payments We Accept

Your purchase with ExamsVCE is safe and fast. Your products will be available for immediate download after your payment has been received.
The ExamsVCE website is protected by 256-bit SSL from McAfee, the leader in online security.

examsvce payment method