Topic 1 Question 86
You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account. What should you do?
Query Data Access logs.
Query Admin Activity logs.
Query Access Transparency logs.
Query Stackdriver Monitoring Workspace.
ユーザの投票
コメント(10)
B is the Ans
👍 12MohitA2020/09/02Ans B "B" is for actions that modify the configuration or metadata of resources. For example, these logs record when users create VM instances or change Identity and Access Management permissions. "A" is only for "user-provided" resource data. Data Access audit logs-- except for BigQuery Data Access audit logs-- "are disabled by default"
👍 5VicF2021/04/22Ans - B
👍 4[Removed]2020/10/30
シャッフルモード