New Year Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

Security-Operations-Engineer Sample Questions Answers

Questions 4

You are helping a new Google Security Operations (SecOps) customer configure access for their SOC team. The customer's Google SecOps administrators currently have access to the Google SecOps instance. The customer is reporting that the SOC team members are not getting authorized to access the instance, but they are able to authenticate to the third-party identity provider (IdP). How should you fix the issue?

Choose 2 answers

Options:

A.

Link Google SecOps to a Google Cloud project with the Chronicle API.

B.

Connect Google SecOps with the third-party IdP using Workforce Identity Federation.

C.

Grant the appropriate data access scope to the SOC team's IdP group in IAM.

D.

Grant the roles/chronicle.viewer role to the SOC team's IdP group in IAM.

E.

Grant the Basic permission to the appropriate IdP groups in the Google SecOps SOAR Advanced Settings.

Buy Now
Questions 5

You have a close relationship with a vendor who reveals to you privately that they have discovered a vulnerability in their web application that can be exploited in an XSS attack. This application is running on servers in the cloud and on-premises. Before the CVE is released, you want to look for signs of the vulnerability being exploited in your environment. What should you do?

Options:

A.

Create a YARA-L 2.0 rule to detect a time-ordered series of events where an external inbound connection to a server was followed by a process on the server that spawned subprocesses previously not seen in the environment.

B.

Activate a new Web Security Scanner scan in Security Command Center (SCC), and look for findings related to XSS.

C.

Ask the Gemini Agent in Google Security Operations (SecOps) to search for the latest vulnerabilities in the environment.

D.

Create a YARA-L 2.0 rule to detect high-prevalence binaries on your web server architecture communicating with known command and control (C2) nodes. Review inbound traffic from those C2 domains that have only started appearing recently.

Buy Now
Questions 6

Your organization has mission-critical production Compute Engine VMs that you monitor daily. While performing a UDM search in Google Security Operations (SecOps), you discover several outbound network connections from one of the production VMs to an unfamiliar external IP address occurring over the last 48 hours. You need to use Google SecOps to quickly gather more context and assess the reputation of the external IP address. What should you do?

Options:

A.

Search for the external IP address in the Alerts & IoCs page in Google SecOps.

B.

Perform a UDM search to identify the specific user account that was logged into the production VM when the connections occurred.

C.

Examine the Google SecOps Asset view details for the production VM.

D.

Create a new detection rule to alert on future traffic from the external IP address.

Buy Now
Questions 7

You are receiving security alerts from multiple connectors in your Google Security Operations (SecOps) instance. You need to identify which IP address entities are internal to your network and label each entity with its specific network name. This network name will be used as the trigger for the playbook.

Options:

A.

Configure each network in the Google SecOps SOAR settings.

B.

Modify the entity attribute in the alert overview.

C.

Create an outcome variable in the rule to assign the network name.

D.

Enrich the IP address entities as the initial step of the playbook.

Buy Now
Questions 8

During a proactive threat hunting exercise, you discover that a critical production project has an external identity with a highly privileged IAM role. You suspect that this is part of a larger intrusion, and it is unknown how long this identity has had access. All logs are enabled and routed to a centralized organization-level Cloud Logging bucket, and historical logs have been exported to BigQuery datasets.

You need to determine whether any actions were taken by this external identity in your environment.

What should you do?

Options:

A.

Analyze IAM recommender insights and Security Command Center (SCC) findings associated with the external identity.

B.

Use Policy Analyzer to identify the resources that are accessible by the external identity. Examine the logs related to these resources in the centralized Cloud Logging bucket and the BigQuery dataset.

C.

Execute queries against the centralized Cloud Logging bucket and the BigQuery dataset to filter for logs where the principal email matches the external identity.

D.

Analyze VPC Flow Logs exported to BigQuery, and correlate source IP addresses with potential login events for the external identity.

Buy Now
Questions 9

You work for an organization that uses Security Command Center (SCC) with Event Threat Detection (ETD) enabled. You need to enable ETD detections for data exfiltration attempts from designated sensitive Cloud Storage buckets and BigQuery datasets. You want to minimize Cloud Logging costs. What should you do?

Options:

A.

Enable "data read" audit logs only for the designated sensitive Cloud Storage buckets and BigQuery datasets.

B.

Enable "data read" and "data write" audit logs only for the designated sensitive Cloud Storage buckets and BigQuery datasets.

C.

Enable "data read" and "data write" audit logs for all Cloud Storage buckets and BigQuery datasets throughout the organization.

D.

Enable VPC Flow Logs for the VPC networks containing resources that access the sensitive Cloud Storage buckets and BigQuery datasets.

Buy Now
Questions 10

You manage a large fleet of Compute Engine instances. Security Command Center (SCC) has generated a large number of CONFIDENTIAL_COMPUTING_DISABLED findings. You need to quickly tune these findings.

What should you do?

Options:

A.

Manually mark the findings as inactive.

B.

Disable Event Threat Detection (ETD)

C.

Create a mute rule for the finding.

D.

Disable the Security Health Analytics detector (SHA).

Buy Now
Questions 11

You are using Google Security Operations (SecOps) to investigate suspicious activity linked to a specific user. You want to identify all assets the user has interacted with over the past seven days to assess potential impact. You need to understand the user's relationships to endpoints, service accounts, and cloud resources. How should you identify user-to-asset relationships in Google SecOps?

Options:

A.

Query for hostnames in UDM Search and filter the results by user.

B.

Run a retrohunt to find rule matches triggered by the user.

C.

Use the Raw Log Scan view to group events by asset ID.

D.

Generate an ingestion report to identify sources where the user appeared in the last seven days.

Buy Now
Questions 12

You have identified a common malware variant on a potentially infected computer. You need to find reliable IoCs and malware behaviors as quickly as possible to confirm whether the computer is infected and search for signs of infection on other computers. What should you do?

Options:

A.

Search for the malware hash in Google Threat Intelligence, and review the results.

B.

Run a Google Web Search for the malware hash, and review the results.

C.

Create a Compute Engine VM, and perform dynamic and static malware analysis.

D.

Perform a UDM search for the file checksum in Google Security Operations (SecOps). Review activities that are associated with, or attributed to, the malware.

Buy Now
Questions 13

Your company uses Google Security Operations (SecOps) Enterprise and is ingesting various logs. You need to proactively identify potentially compromised user accounts. Specifically, you need to detect when a user account downloads an unusually large volume of data compared to the user's established baseline activity. You want to detect this anomalous data access behavior using minimal effort. What should you do?

Options:

A.

Develop a custom YARA-L detection rule in Google SecOps that counts download bytes per user per hour and triggers an alert if a threshold is exceeded.

B.

Create a log-based metric in Cloud Monitoring, and configure an alert to trigger if the data downloaded per user exceeds a predefined limit. Identify users who exceed the predefined limit in Google SecOps.

C.

Inspect Security Command Center (SCC) default findings for data exfiltration in Google SecOps.

D.

Enable curated detection rules for User and Endpoint Behavioral Analytics (UEBA), and use the Risk Analytics dashboard in Google SecOps to identify metrics associated with the anomalous activity.

Buy Now
Questions 14

You are an incident responder at your organization using Google Security Operations (SecOps) for monitoring and investigation. You discover that a critical production server, which handles financial transactions, shows signs of unauthorized file changes and network scanning from a suspicious IP address. You suspect that persistence mechanisms may have been installed. You need to use Google SecOps to immediately contain the threat while ensuring that forensic data remains available for investigation. What should you do first?

Options:

A.

Use the firewall integration to submit the IP address to a network block list to inhibit internet access from that machine.

B.

Deploy emergency patches, and reboot the server to remove malicious persistence.

C.

Use the EDR integration to quarantine the compromised asset.

D.

Use VirusTotal to enrich the IP address and retrieve the domain. Add the domain to the proxy block list.

Buy Now
Questions 15

Your company's analyst team uses a playbook to make necessary changes to external systems that are integrated with the Google Security Operations (SecOps) platform. You need to automate the task to run once every day at a specific time. You want to use the most efficient solution that minimizes maintenance overhead.

Options:

A.

Write a custom Google SecOps SOAR job in the IDE using the code from the existing playbook actions.

B.

Create a Cron Scheduled Connector for this use case. Configure a playbook trigger to match the cases created by the connector that runs the playbook with the relevant actions.

C.

Create a Google SecOps SOAR request and a playbook trigger to match the request from the user to start the playbook with the relevant actions.

D.

Use a VM to host a script that runs a playbook via an API call.

Buy Now
Questions 16

You are a SOC manager guiding an implementation of your existing incident response plan (IRP) into Google Security Operations (SecOps). You need to capture time duration data for each of the case stages. You want your solution to minimize maintenance overhead. What should you do?

Options:

A.

Create a Google SecOps dashboard that displays specific actions that have been run, identifies which stage a case is in, and calculates the time elapsed since the start of the case.

B.

Configure Case Stages in the Google SecOps SOAR settings, and use the Change Case Stage action in your playbooks that captures time metrics when the stage changes.

C.

Configure a detection rule in SIEM Rules & Detections to include logic to capture the event fields for each case with the relevant stage metrics.

D.

Write a job in the IDE that runs frequently to check the progress of each case and updates the notes with timestamps to reflect when these changes were identified.

Buy Now
Questions 17

You need to augment your organization's existing Security Command Center (SCC) implementation with additional detectors. You have a list of known IoCs and would like to include external signals for this capability to ensure broad detection coverage. What should you do?

Options:

A.

Create a custom posture for your organization that combines the prebuilt Event Threat Detection and Security Health Analytics (SHA) detectors.

B.

Create a Security Health Analytics (SHA) custom module using the compute address resource.

C.

Create an Event Threat Detection custom module using the "Configurable Bad IP" template.

D.

Create a custom log sink with internal and external IP addresses from threat intelligence. Use the SCC API to generate a finding for each event.

Buy Now
Questions 18

Your company requires PCI DSS v4.0 compliance for its cardholder data environment (CDE) in Google Cloud. You use a Security Command Center (SCC) security posture deployment based on the PCI DSS v4.0 template to monitor for configuration drift.1 This posture generates a finding indicating that a Compute Engine VM within the CDE scope has been configured with an external IP address. You need to take an immediate action to remediate the compliance drift identified by this specific SCC posture finding. What should you do?

Options:

A.

Enable and enforce the constraints/compute.vmExternalIpAccess organization policy constraint at the project level for the project where the VM resides.

B.

Remove the CDE-specific tag from the VM to exclude the tag from this particular PCI DSS posture evaluation scan.

C.

Reconfigure the network interface settings for the VM to explicitly remove the assigned external IP address.

D.

Navigate to the underlying Security Health Analytics (SHA) finding for public_ip_address on the VM. and mark this finding as fixed.

Buy Now
Exam Code: Security-Operations-Engineer
Exam Name: Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam
Last Update: Jan 8, 2026
Questions: 60
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now Security-Operations-Engineer