New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Security-Operations-Engineer Exam Dumps - Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam

Searching for workable clues to ace the Google Security-Operations-Engineer Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Security-Operations-Engineer PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

You are helping a new Google Security Operations (SecOps) customer configure access for their SOC team. The customer's Google SecOps administrators currently have access to the Google SecOps instance. The customer is reporting that the SOC team members are not getting authorized to access the instance, but they are able to authenticate to the third-party identity provider (IdP). How should you fix the issue?

Choose 2 answers

A.

Link Google SecOps to a Google Cloud project with the Chronicle API.

B.

Connect Google SecOps with the third-party IdP using Workforce Identity Federation.

C.

Grant the appropriate data access scope to the SOC team's IdP group in IAM.

D.

Grant the roles/chronicle.viewer role to the SOC team's IdP group in IAM.

E.

Grant the Basic permission to the appropriate IdP groups in the Google SecOps SOAR Advanced Settings.

Full Access
Question # 10

You are receiving security alerts from multiple connectors in your Google Security Operations (SecOps) instance. You need to identify which IP address entities are internal to your network and label each entity with its specific network name. This network name will be used as the trigger for the playbook.

A.

Configure each network in the Google SecOps SOAR settings.

B.

Modify the entity attribute in the alert overview.

C.

Create an outcome variable in the rule to assign the network name.

D.

Enrich the IP address entities as the initial step of the playbook.

Full Access
Question # 11

You are developing a new detection rule in Google Security Operations (SecOps). You are defining the YARA-L logic that includes complex event, match, and condition sections. You need to develop and test the rule to ensure that the detections are accurate before the rule is migrated to production. You want to minimize impact to production processes. What should you do?

A.

Develop the rule logic in the UDM search, review the search output to inform changes to filters and logic, and copy the rule into the Rules Editor.

B.

Use Gemini in Google SecOps to develop the rule by providing a description of the parameters and conditions, and transfer the rule into the Rules Editor.

C.

Develop the rule in the Rules Editor, define the sections of the rule logic, and test the rule using the test rule feature.

D.

Develop the rule in the Rules Editor, define the sections of the rule logic, and test the rule by setting it to live but not alerting. Run a YARA-L retrohunt from the rules dashboard.

Full Access
Question # 12

You need to augment your organization's existing Security Command Center (SCC) implementation with additional detectors. You have a list of known IoCs and would like to include external signals for this capability to ensure broad detection coverage. What should you do?

A.

Create a custom posture for your organization that combines the prebuilt Event Threat Detection and Security Health Analytics (SHA) detectors.

B.

Create a Security Health Analytics (SHA) custom module using the compute address resource.

C.

Create an Event Threat Detection custom module using the "Configurable Bad IP" template.

D.

Create a custom log sink with internal and external IP addresses from threat intelligence. Use the SCC API to generate a finding for each event.

Full Access
Question # 13

You are writing a Google Security Operations (SecOps) SOAR playbook that uses the VirusTotal v3 integration to look up a URL that was reported by a threat hunter in an email. You need to use the results to make a preliminary recommendation on the maliciousness of the URL and set the severity of the alert based on the output. What should you do?

Choose 2 answers

A.

Use a conditional statement to determine whether to treat the URL as suspicious or benign.

B.

Pass the response back to the SIEM.

C.

Verify that the response is accurate by manually checking the URL in VirusTotal.

D.

Create a widget that translates the JSON output to a severity score.

E.

Use the number of detections from the response JSON in a conditional statement to set the severity.

Full Access
Question # 14

You use Google Security Operations (SecOps) curated detections and YARA-L rules to detect suspicious activity on Windows endpoints. Your source telemetry uses EDR and Windows Events logs. Your rules match on the principal.user.userid UDM field. You need to ingest an additional log source for this field to match all possible log entries from your EDR and Windows Event logs. What should you do?

A.

Ingest logs from Microsoft Entra ID.

B.

Ingest logs from Windows Procmon.

C.

Ingest logs from Windows PowerShell.

D.

Ingest logs from Windows Sysmon.

Full Access
Question # 15

Your company is adopting a multi-cloud environment. You need to configure comprehensive monitoring of threats using Google Security Operations (SecOps). You want to start identifying threats as soon as possible. What should you do?

A.

Use Gemini to generate YARA-L rules for multi-cloud use cases.

B.

Use curated detections from the Cloud Threats category to monitor your cloud environment.

C.

Use curated detections for Applied Threat Intelligence to monitor your company's cloud environment.

D.

Ask Cloud Customer Care to provide a set of rules recommended by Google to monitor your company's cloud environment.

Full Access
Question # 16

Your organization has recently acquired Company A, which has its own SOC and security tooling. You have already configured ingestion of Company A’s security telemetry and migrated their detection rules to Google Security Operations (SecOps). You now need to enable Company A's analysts to work their cases in Google SecOps. You need to ensure that Company A's analysts:

• do not have access to any case data originating from outside of Company A.

• are able to re-purpose playbooks previously developed by your organization's employees.

You need to minimize effort to implement your solution. What is the first step you should take?

A.

Create a Google SecOps SOAR environment for Company A.

B.

Define a new SOC role for Company A.

C.

Provision a new service account for Company A.

D.

Acquire a second Google SecOps SOAR tenant for Company A.

Full Access
Go to page: