GCP Professional Cloud Security Engineer Practice Question

Your security team needs to run SQL queries in Log Analytics to identify outbound HTTP requests that Cloud NGFW blocks as command-and-control traffic. You deployed a regional Cloud NGFW Standard tier with layer-7 inspection and enabled logging, but no threat-type entries appear in Cloud Logging. Without adding new third-party services, what change will allow the SOC to obtain the required threat logs?

  • Enable Firewall Rules Logging on all VPC firewall rules and include full metadata to capture threat information.

  • Configure Packet Mirroring to feed traffic to Cloud IDS and query the resulting IDS alert logs in Log Analytics.

  • Migrate the regional Cloud NGFW to the Enterprise tier and enable intrusion prevention with threat logging on each firewall policy rule.

  • Activate Event Threat Detection in Security Command Center and export its findings to Log Analytics for analysis.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot