Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass Security-Operations-Engineer Exam Guide

Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Questions and Answers

Question 13

Your organization has recently onboarded to Google Cloud with Security Command Center Enterprise (SCCE) and is now integrating it with your organization's SOC. You want to automate the response process within SCCE and integrate with the existing SOC ticketing system. You want to use the most efficient solution. How should you implement this functionality?

Options:

A.

Use the SCC notifications feed to send alerts to Pub/Sub. Ingest these feeds using the relevant SIEM connector.

B.

Evaluate each event within the SCC console. Create a ticket for each finding in the ticketing system, and include the remediation steps.

C.

Disable the generic posture finding playbook in Google Security Operations (SecOps) SOAR and enable the playbook for the ticketing system. Add a step in your Google SecOps SOAR playbook to generate a ticket based on the event type.

D.

Configure the SCC notifications feed to send alerts to a Cloud Storage bucket. Create a Dataflow job to read the new files, extract the relevant information, and send the information to the SOC ticketing system.

Question 14

You are a security engineer at a managed security service provider (MSSP) that is onboarding to Google Security Operations (SecOps). You need to ensure that cases for each customer are logically separated. How should you configure this logical separation?

Options:

A.

In Google SecOps SOAR settings, create a role for each customer.

B.

In Google SecOps Playbooks, create a playbook for each customer.

C.

In Google SecOps SOAR settings, create a permissions group for each customer.

D.

In Google SecOps SOAR settings, create a new environment for each customer.

Question 15

You are a platform engineer at an organization that is migrating from a third-party SIEM product to Google Security Operations (SecOps). You previously manually exported context data from Active Directory (AD) and imported the data into your previous SIEM as a watchlist when there were changes in AD's user/asset context data. You want to improve this process using Google SecOps. What should you do?

Options:

A.

Ingest AD organizational context data as user/asset context to enrich user/asset information in your security events.

B.

Configure a Google SecOps SOAR integration for AD to enrich user/asset information in your security alerts.

C.

Create a data table that contains AD context data. Use the data table in your YARA-L rule to find user/asset data that can be correlated within each security event.

D.

Create a data table that contains the AD context data. Use the data table in your YARA-L rule to find user/asset information for each security event.