Topic 1 Question 199
As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system so that you are alerted to possible intrusions.
Which logs should you analyze?
Data Access audit logs
Policy Denied audit logs
Cloud Identity user log events
Admin Activity audit logs
ユーザの投票
コメント(3)
- 正解だと思う選択肢: A
The data_access log name only appears if there was traffic to your resource after you enabled Cloud Audit Logs for IAP.
Click to expand the date and time of the access you want to review.
Authorized access has a blue i icon. Unauthorized access has an orange !! icon."
👍 2gcp4test2023/08/04 - 正解だと思う選択肢: A👍 1Mithung302023/08/06
- 正解だと思う選択肢: A
A is fire
👍 1cyberpunk212023/08/23
シャッフルモード