Examtopics

Professional Cloud Security Engineer
  • Topic 1 Question 248

    During a routine security review, your team discovered a suspicious login attempt to impersonate a highly privileged but regularly used service account by an unknown IP address. You need to effectively investigate in order to respond to this potential security incident. What should you do?

    • Enable Cloud Audit Logs for the resources that the service account interacts with. Review the logs for further evidence of unauthorized activity.

    • Review Cloud Audit Logs for activity related to the service account. Focus on the time period of the suspicious login attempt.

    • Run a vulnerability scan to identify potentially exploitable weaknesses in systems that use the service account.

    • Check Event Threat Detection in Security Command Center for any related alerts. Cross-reference your findings with Cloud Audit Logs.


    シャッフルモード