New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmasmnth

You have a custom-built YARA-L rule in Google Security Operations (SecOps) correlating observed IP addresses...

You have a custom-built YARA-L rule in Google Security Operations (SecOps) correlating observed IP addresses in network and EDR logs against threat intelligence findings ingested from a Malware Information Sharing Platform (MISP) over a 2-minute time window. Your company's SOC reported that the rule generates too many false positives. You want to reduce the number of false positives generated by the rule while continuing to use threat intelligence.

What should you do?

A.

Convert the rule to a dashboard, and use a match window of 24 hours to visualize entities in a bar chart.

B.

Modify the rule to alert only when the graph.metadata.threat.severity value is critical or high.

C.

Modify the rule to trigger only when the ICCs graph.risk_score.risk_score field exceeds 500.

D.

Adjust the match window in the rule to 24 hours to aggregate IP addresses by asset once a day.

Google Security-Operations-Engineer Summary

  • Vendor: Google
  • Product: Security-Operations-Engineer
  • Update on: Dec 19, 2025
  • Questions: 60
Price: $52.5  $149.99
Buy Now Security-Operations-Engineer PDF + Testing Engine Pack

Payments We Accept

Your purchase with ExamsVCE is safe and fast. Your products will be available for immediate download after your payment has been received.
The ExamsVCE website is protected by 256-bit SSL from McAfee, the leader in online security.

examsvce payment method