Examtopics

Professional Cloud Security Engineer
  • Topic 1 Question 199

    As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system so that you are alerted to possible intrusions.

    Which logs should you analyze?

    • Data Access audit logs

    • Policy Denied audit logs

    • Cloud Identity user log events

    • Admin Activity audit logs


    シャッフルモード