GCP Professional Cloud Security Engineer Practice Question

Your security team must detect command-and-control (C2) activity originating from Compute Engine VMs in a production VPC and have every Cloud IDS finding available for near-real-time SQL analysis in the organization's centralized "sec-logs" project, which already contains a Log Analytics-enabled log bucket. You want a solution that reuses managed Google Cloud features and minimizes custom code and ongoing maintenance. What should you do?

  • Create a regional Packet Mirroring policy that mirrors all VM egress traffic to a new Cloud IDS endpoint in the same region, then configure an organization-level aggregated log sink that filters on the Cloud IDS threat log and routes it to the existing "sec-logs" log bucket.

  • Enable VPC Flow Logs at sampling rate 1.0, export the logs to Pub/Sub, and deploy a Dataflow pipeline that parses the logs and writes C2 events to BigQuery in the "sec-logs" project.

  • Deploy third-party IDS sensors on a dedicated GKE cluster, forward mirrored traffic to the sensors, and use a custom Fluentd daemonset to push alerts to the "sec-logs" bucket.

  • Turn on Cloud NGFW in Enterprise tier with threat prevention, then configure Cloud Monitoring alerting policies to copy all firewall threat logs into the "sec-logs" project via Pub/Sub.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot