Google Professional Security Operations Engineer Exam Practice Questions (P. 1)
- Full Access (131 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
You are responsible for identifying suspicious activity and security events at your organization. You have been asked to search in Google Security Operations (SecOps) for network traffic associated with an active HTTP backdoor that runs on TCP port 5555. You want to use the most effective approach to identify traffic originating from the server that is running the backdoor. What should you do?
- ADetect on events where network.ApplicationProtocol is HTTP.
- BDetect on events where target.port is 5555.
- CDetect on events where principal.port is 5555.
- DDetect on events where network.ip_protocol is TCP.
send
light_mode
delete
Question #2
You are an incident responder at your organization using Google Security Operations (SecOps) for monitonng and investigation. You discover that a critical production server, which handles financial transactions, shows signs of unauthorized file changes and network scanning from a suspicious IP address. You suspect that persistence mechanisms may have been installed. You need to use Google SecOps to immediately contain the threat while ensuring that forensic data remains available for investigation. What should you do first?
- AUse the firewall integration to submit the IP address to a network block list to inhibit internet access from that machine.
- BDeploy emergency patches, and reboot the server to remove malicious persistence.
- CUse the EDR integration to quarantine the compromised asset.
- DUse VirusTotal to enrich the IP address and retrieve the domain. Add the domain to the proxy block list.
send
light_mode
delete
Question #3
Your organization uses Google Security Operations (SecOps). You discover frequent file downloads from a shared workspace within a short time window. You need to configure a rule in Google SecOps that identifies these suspicious events and assigns higher risk scores to repeated anomalies. What should you do?
- AConfigure a rule that flags file download events with the highest risk score, regardless of time frame.
- BCreate a frequency-based YARA-L detection rule that assigns a risk outcome score and is triggered when multiple suspicious downloads occur within a defined time frame.
- CConfigure a single-event YARA-L detection rule that assigns a risk outcome score and is triggered when a user downloads a large number of files in 24 hours.
- DEnable default curated detections, and use automatic alerting for single file download events.
send
light_mode
delete
Question #4
You are implementing Google Security Operations (SecOps) at your organization. You discover that the current detection rules are too noisy. Due to the high volume of alerts, some true positives might be missed. You want to ingest additional context sources to reduce false positives in your security detections and to improve the overall positive ratio of the alerts. What should you do?
- AIngest high-value asset (HVA) data from your configuration management database (CMDB) system to increase the priority of the alerts based on the sensitivity of the assets found in the detection rules.
- BIngest dark web forum handlers from your threat intelligence system to match dark web principals within the detection rules.
- CIngest IOCs from your threat intelligence system to validate the IP addresses, domains and hashes with the detection rules.
- DIngest tactics, techniques, and procedures (TTPs) from your threat intelligence system to validate the processes and tools with the detection rules.
send
light_mode
delete
Question #5
You are developing a new detection rule in Google Security Operations (SecOps). You are defining the YARA-L logic that includes complex event, match, and condition sections. You need to develop and test the rule to ensure that the detections are accurate before the rule is migrated to production. You want to minimize impact to production processes. What should you do?
- ADevelop the rule logic in the UDM search, review the search output to inform changes to filters and logic, and copy the rule into the Rules Editor.
- BUse Gemini in Google SecOps to develop the rule by providing a description of the parameters and conditions, and transfer the rule into the Rules Editor.
- CDevelop the rule in the Rules Editor, define the sections the rule logic, and test the rule using the test rule feature.
- DDevelop the rule in the Rules Editor, define the sections of the rule logic, and test the rule by setting it to live but not alerting. Run a YARA-L retrohunt from the rules dashboard.
send
light_mode
delete
All Pages
