Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Google Cloud Certified Security-Operations-Engineer Questions and answers with Dumpstech

Exam Security-Operations-Engineer Premium Access

View all detail and faqs for the Security-Operations-Engineer exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your organization is a Google Security Operations (SecOps) customer. The compliance team requires a weekly export of case resolutions and SLA metrics of high and critical severity cases over the past week. The compliance team's post-processing scripts require this data to be formatted as tabular data in CSV files, zipped, and delivered to their email each Monday morning. What should you do?

Options:

A.

Generate a report in SOAR Reports, and schedule delivery of the report.

B.

Build a detection rule with outcomes, and configure a Google SecOps SOAR job to format and send the report.

C.

Build an Advanced Report in SOAR Reports, and schedule delivery of the report.

D.

Use statistics in search, and configure a Google SecOps SOAR job to format and send the report.

Questions # 12:

You are developing a new detection rule in Google Security Operations (SecOps). You are defining the YARA-L logic that includes complex event, match, and condition sections. You need to develop and test the rule to ensure that the detections are accurate before the rule is migrated to production. You want to minimize impact to production processes. What should you do?

Options:

A.

Develop the rule logic in the UDM search, review the search output to inform changes to filters and logic, and copy the rule into the Rules Editor.

B.

Use Gemini in Google SecOps to develop the rule by providing a description of the parameters and conditions, and transfer the rule into the Rules Editor.

C.

Develop the rule in the Rules Editor, define the sections of the rule logic, and test the rule using the test rule feature.

D.

Develop the rule in the Rules Editor, define the sections of the rule logic, and test the rule by setting it to live but not alerting. Run a YARA-L retrohunt from the rules dashboard.

Questions # 13:

You are a security operations engineer in an enterprise that uses Google Security Operations (SecOps). You need to improve your detection coverage and reduce the false positive detection ratio as quickly as possible.

What should you do?

Options:

A.

Enable curated detections to identify threats.

B.

Ingest data from your threat intelligence platform (TIP) into Google SecOps.

C.

Develop YARA-L detection rules that focus on threat intelligence.

D.

Design YARA-L detection rules based on Google SecOps Marketplace use cases.

Questions # 14:

You are a SOC manager guiding an implementation of your existing incident response plan (IRP) into Google Security Operations (SecOps). You need to capture time duration data for each of the case stages. You want your solution to minimize maintenance overhead. What should you do?

Options:

A.

Create a Google SecOps dashboard that displays specific actions that have been run, identifies which stage a case is in, and calculates the time elapsed since the start of the case.

B.

Configure Case Stages in the Google SecOps SOAR settings, and use the Change Case Stage action in your playbooks that captures time metrics when the stage changes.

C.

Configure a detection rule in SIEM Rules & Detections to include logic to capture the event fields for each case with the relevant stage metrics.

D.

Write a job in the IDE that runs frequently to check the progress of each case and updates the notes with timestamps to reflect when these changes were identified.

Questions # 15:

Your organization uses the curated detection rule set in Google Security Operations (SecOps) for high priority network indicators. You are finding a vast number of false positives coming from your on-premises proxy servers. You need to reduce the number of alerts. What should you do?

Options:

A.

Configure a rule exclusion for the target.ip field.

B.

Configure a rule exclusion for the principal.ip field.

C.

Configure a rule exclusion for the network.asset.ip field.

D.

Configure a rule exclusion for the target.domain field.

Questions # 16:

Your Google Security Operations (SecOps) case queue contains a case with IP address entities. You need to determine whether the entities are internal or external assets and ensure that internal IP address entities are marked accordingly upon ingestion into Google SecOps SOAR. What should you do?

Options:

A.

Configure a feed to ingest enrichment data about the networks, and include these fields into your detection outcome.

B.

Modify the connector logic to perform a secondary lookup against your CMDB and flag incoming entities as internal or external.

C.

Indicate your organization's known internal CIDR ranges in the Environment Networks list in the settings.

D.

Create a custom action to ping the IP address entity from your Remote Agent. If successful, the custom action designates the IP address entity as internal.

Questions # 17:

Your organization has recently onboarded to Google Cloud with Security Command Center Enterprise (SCCE) and is now integrating it with your organization's SOC. You want to automate the response process within SCCE and integrate with the existing SOC ticketing system. You want to use the most efficient solution. How should you implement this functionality?

Options:

A.

Use the SCC notifications feed to send alerts to Pub/Sub. Ingest these feeds using the relevant SIEM connector.

B.

Evaluate each event within the SCC console. Create a ticket for each finding in the ticketing system, and include the remediation steps.

C.

Disable the generic posture finding playbook in Google Security Operations (SecOps) SOAR and enable the playbook for the ticketing system. Add a step in your Google SecOps SOAR playbook to generate a ticket based on the event type.

D.

Configure the SCC notifications feed to send alerts to a Cloud Storage bucket. Create a Dataflow job to read the new files, extract the relevant information, and send the information to the SOC ticketing system.

Questions # 18:

You are receiving security alerts from multiple connectors in your Google Security Operations (SecOps) instance. You need to identify which IP address entities are internal to your network and label each entity with its specific network name. This network name will be used as the trigger for the playbook.

Options:

A.

Configure each network in the Google SecOps SOAR settings.

B.

Modify the entity attribute in the alert overview.

C.

Create an outcome variable in the rule to assign the network name.

D.

Enrich the IP address entities as the initial step of the playbook.

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions