GCP Professional Cloud Security Engineer Practice Question
Your organization aggregates all Admin Activity and Policy Denied Cloud Audit Logs from every project into an organization-level log bucket called sec-audit. Security operations must be paged whenever a new Policy Denied entry whose status.message contains IAM_POLICY_DENIED is written to that bucket. They want to minimize additional Monitoring time-series and ensure only one notification is sent if several matching entries arrive within the same 30-minute window. Which approach best satisfies these requirements?
Create an organization-level counter logs-based metric with the same filter, then build a Cloud Monitoring alert policy that fires when the metric's value exceeds zero during a 5-minute window.
Define an organization-level logs-based alert that uses an advanced filter on logName:"cloudaudit.googleapis.com%2Fpolicy" AND status.message="IAM_POLICY_DENIED"; set the alert's notification rate limit to 30 minutes and attach the PagerDuty notification channel.
Enable Event Threat Detection in Security Command Center and configure finding notifications to send PagerDuty incidents when any access-denied threat is detected.
Add a log sink that exports the IAM_POLICY_DENIED entries to Pub/Sub; trigger a Cloud Function that calls the Cloud Monitoring Events API to open an incident and uses Cloud Tasks to deduplicate alerts for 30 minutes.
A logs-based alert defined at the organization level evaluates the incoming log stream directly with an advanced filter, so it fires as soon as a matching Policy Denied entry is ingested. Because logs-based alerts don't create or store custom metrics, they avoid the cardinality and cost overhead that counter metrics introduce, meeting the "minimize additional time-series" requirement. The alert policy itself lets you specify a 30-minute notification rate limit and attach the existing PagerDuty notification channel.
Creating a counter logs-based metric and separate alert would meet the functional need but contradicts the requirement to avoid generating extra Monitoring time-series. Exporting logs to Pub/Sub and invoking a Cloud Function adds unnecessary operational complexity and still requires custom code to suppress duplicates. Relying on Event Threat Detection findings does not guarantee coverage for every IAM_POLICY_DENIED message and would not directly leverage Cloud Monitoring alert policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a logs-based alert?
Open an interactive chat with Bash
Why avoid creating Monitoring time-series with counter metrics?
Open an interactive chat with Bash
How does a PagerDuty notification channel work in Google Cloud?
Open an interactive chat with Bash
What is a logs-based alert in GCP?
Open an interactive chat with Bash
How does GCP handle notification rate limits for alerts?
Open an interactive chat with Bash
What is the role of PagerDuty in GCP alerting?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .