GCP Professional Cloud Security Engineer Practice Question

Your financial services company operates dozens of GCP projects. You have enabled Security Command Center Premium at the organization level and turned on Cloud IDS, Security Health Analytics, and Container Threat Detection. The security operations team must receive an incident ticket as soon as a new HIGH or CRITICAL finding appears, without building custom polling logic or managing additional infrastructure. Which solution satisfies these requirements with the least operational overhead?

  • Use the built-in Jira integration in Security Command Center and map HIGH and CRITICAL severities to automatically create incident tickets.

  • Enable Security Command Center findings notifications to publish to a dedicated Pub/Sub topic, and deploy a Cloud Function triggered by that topic to call the incident-management system's API.

  • Set up an organization-level aggregated log sink to BigQuery, then schedule a Cloud Scheduler job every hour to query for new HIGH or CRITICAL findings and create tickets through Cloud Run.

  • Create a log-based metric on Security Command Center logs, configure a Cloud Monitoring alert that publishes to Pub/Sub, and trigger a Cloud Function from that topic to open a ticket.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot