GCP Professional Cloud Security Engineer Practice Question

Your company has activated Security Command Center (SCC) at the organization level using the Standard tier. Security operations now wants to be alerted within minutes when brute-force login attempts against Cloud SQL or suspicious IAM role-binding changes are detected. They prefer a built-in, fully managed capability rather than developing and maintaining custom log-based detections. What should you do to meet the requirement?

  • Deploy Cloud IDS, create custom log-based metrics for Cloud Audit Logs, and forward the alerts into SCC through Pub/Sub integration.

  • Upgrade Security Command Center to the Premium tier and enable Event Threat Detection so that its near-real-time findings appear automatically in SCC.

  • Enable Web Security Scanner in SCC Standard and schedule continuous scans to identify brute-force attempts and role-binding changes.

  • Remain on the Standard tier and configure Security Health Analytics to run hourly scans for Cloud SQL and IAM misconfigurations.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot