Google Cloud SecOps Technical Credential Assessment Answers
Google Cloud SecOps Technical Credential Assessment Answers
This assessment will test your knowledge of the SecOps (Chronical and Mandiant) products. You must achieve a score of 80% or higher to receive the technical credential.
50 questions
Questions:
- Cloud Storage object
- Direct to Ingestion API
- Third party (3P) data feeds
- Syslog over TLS
- Syslog over TLS
- Log4j
- PCAP raw
- Amazon Firehose
- Disk Queue
- IAP Proxy
- Bindplane Gateway
- Raw Logs
- SyslogNG
- Bindplane
- Prometheus
- NXLog
When data is ingested into Google SecOps, when is the raw data discarded?
- Raw data is never retained in Google SecOps, only data successfully parsed into the UDM schema.
- If the data is ingested, the raw data is always retained even if parsing fails.
- If parsing fails then the raw data will also be discarded.
- If the parser for the data type indicates that the log should be dropped, it will be discarded.
- Google SecOps Standardization Processor
- Otel Schema Formatted Processor
- Google SecOps Output Processor
- Bindplane Standardization Processor
Which of the following data sources can be configured as a Direct ingestion data source?
- SCC Findings
- Any log source relayed by Bindplane
- AWS GuardDuty
- Azure Entra ID
- Navigate to Settings -> SIEM Settings -> Profile and look for assigned Data Access scopes.
- Use the Customer Management API to pull a list of users and their scopes.
- Run a search across all data using Regex and listing the LogTypes provided.
- Refer to the configuration in Workforce Identity Federation or Cloud Identity to see the roles assigned.
- SIEM Search, Detection Rules, Reference Lists, Native Dashboards
- Ontology, Detection Rules. Reference Lists, Native Dashboards
- Entity Graph, Ontology, Detection Rules
- SIEM Search, Ontology, Cases, Detection Rules
- Features and Data
- Threat Intelligence and AI
- People and Entities
- Rules and DataTables
Chronicle SIEM had a Legacy RBAC system that was replaced with what GCP technology?
- Google Cloud Identity
- Google Workforce Identity Federation
- Cloud IAM
- GMail Access Controls
- All
- 1
- 2
- 3
When using the SOAR interface in Google SecOps which view is applied to all cases automatically?
- Default Case View
- Case Summary View
- Alert Case View
- Env Case View
- Connectors
- Case
- Alert
- Artifacts
- Integration
- Marketplace Tool
- App
- Connector
- All of these actions are possible.
- Ingest a simulated case as a Test case
- Assign a simulated case
- Choose the environment in which the simulation takes place
The rule language in Google SecOps was designed for what purpose?
- Metric Visualization
- Threat Detection
- Data Analytics
- Business Intelligence
- SecOps Template System (SOTS)
- SecOps CLI
- Google SecOps Swagger Interface
- SecOps Notebook
What three components make up the Google SecOps Entity Context Graph (ECG).
- Entity Context, Derived Context, Global Context
- Entity Context, Asset Context, Time Domain Context
- Host Context, Process Context, Time Domain Context
- Entity Context, Global Context, Local Context
Which Google SecOps capability reduces operator toil and MTTR?
- Telemetry Collection
- Analytics & Detection
- Alert Triage & Automated Response
- Applied Threat Intel & ML
- Customer Management API
- Chronicle Provisioning API v1
- Backstory Deployment API
- SecOps Management API
What API must be enabled with a project to allow it to bind to Google SecOps?
- Google SecOps API
- Ingestion API
- Chronicle API
- Backstory Deployment API
What authentication methods are currently supported for a Google SecOps tenant?
- Google Cloud Identity, Google Workforce Identity Federation, Federated Auth with SAML
- Google Cloud Identity, Google Workforce Identity Federation, Local Authentication Accounts
- Local Authentication Accounts, Google Cloud Identity, OpenIdentity Federation
- Google Cloud Identity, Local Authentication Accounts, Federated Auth with SAML
- Configure GCP Environment, Deploy Tenant, Enable Authentication
- Configure GCP Environment, Define Authentication, Deploy Tenant
- Install agent on endpoints, Configure GCP Environment, Define Authentication
- Define Authentication, Configure GCP Environment, Install agent on endpoints
How many regions can an MSSP tenant support?
- MSSP tenants can support customer tenants in multiple sub-regions.
- MSSP tenants can support customer tenants deployed anywhere in the world.
- MSSP tenants can support customer tenants in multiple regions.
- MSSP tenants can only support customer tenants in a single region
- Google Cloud Identity
- One Time Passwords from Android Phones
- GMail Accounts
- Google Project IAM
How many Google SecOps tenants can be bound to a single GCP project?
- 3
- 1
- 4
- 2
- Event, Case
- Event, IOC
- Event, Entity
- Entity, Alert
- 30 days
- 5 days
- Never, the operator must opt-in
- 15 days
- Parser Extension
- Custom Parser
- CBN Extension
- Metaparser
- Graylog
- sawmill
- Logstash
- Beats
- Collector API, Data Labels
- Feed Management API, Logtypes
- Parsing API, Data Labels
- Ingestion API, Logtypes
- printf()
- statedump
- dump
- line_24_print
There are two methods that can be used to manage Google SecOps parsers (CBNs), what are they?
- Parser Management UI, CLI Tool
- Parser Extension UI, gcloud parser terminal
- CBN Parser API Extension, logstash graph interface
- Parser Management UI, grok TUI
- Manual Intervention
- Cases
- Rules
- Alerts
- A block can merge playbooks
- Custom python code must be contained in a block
- Additional functions are accessible in a block
- Updating a block, updates it everywhere.
- Run a playbook
- Display HTML widgets
- Display highlighted entities
- Customizable by user role
- Time Context, Device Context, Domain Context
- Entity Context, Derived Context, Global Context
- Name Context, IP Context, Hash Context
- Local Context, Inferred Context, Universal Context
- net.ip_range_in_cidr
- uint.cc_number
- text.hash_id
- number.postal_code
The Google SecOps search interface provides two methods to search data. What are they?
- Raw and Event
- Event and Entity
- Raw and Alerts
- Raw and UDM
What is the name of the API that enables users to create and manage rules?
- Detection Engine API
- Ingestion API
- Threat Rule API
- Alert API
- Using the entity graph syntax
- preprending 'e' to the field name
- referencing functions that use Google Threat Intel
- Using a join from an external database
- Enriched fields are not displayed until they are present in a case.
- The enriched fields are the only fields displayed.
- The enriched fields are annotated with an 'E'
- Enriched fields are created with the outcome section of an alert.
- domain, source, time
- domain, email, file path
- namespace, file path, date
- time, destination, path
- Universal Data Model
- Unified Data Management
- Unified Data Model
- Universal Data Management
- Exception list
- Playbooks
- Filter list
- Blocklist
- Alert Type - Period - Data Source
- Alert Type - Product - Data Source
- Data Source - Product - Event Type
- Product - Subscriber Product - Data Source
- Time window
- Entity mapping
- Grouping Rules
- Case viewer
- Events -> Alerts -> Rule
- Alerts -> Groups -> Rule
- Events -> Alerts -> Case
- Alerts -> Events -> Case
- Webhooks
- Actions
- Mapping rules
- Connectors
More certification exam answers in english: https://en.certificationanswers.com/exams-answers/