New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Security-Operations-Engineer Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Questions and Answers

Questions 4

Your company has deployed two on-premises firewalls. You need to configure the firewalls to send logs to Google Security Operations (SecOps) using Syslog. What should you do?

Options:

A.

Deploy a Google Ops Agent on your on-premises environment, and set the agent as the Syslog destination.

B.

Pull the firewall logs by using a Google SecOps feed integration.

C.

Deploy a third-party agent (e.g., Bindplane, NXLog) on your on-premises environment, and set the agent as the Syslog destination.

D.

Set the Google SecOps URL instance as the Syslog destination.

Buy Now
Questions 5

You have been tasked with developing a new response process in a playbook to contain an endpoint. The new process should take the following actions:

    Send an email to users who do not have a Google Security Operations (SecOps) account to request approval for endpoint containment.

    Automatically continue executing its logic after the user responds.

You plan to implement this process in the playbook by using the Gmail integration. You want to minimize the effort required by the SOC analyst. What should you do?

Options:

A.

Set the containment action to 'Manual' and assign the action to the user to execute or skip the containment action.

B.

Set the containment action to 'Manual' and assign the action to the appropriate tier. Contact the user by email to request approval. The analyst chooses to execute or skip the containment action.

C.

Use the 'Send Email' action to send an email requesting approval to contain the endpoint, and use the 'Wait For Thread Reply' action to receive the result. The analyst manually contains the endpoint.

D.

Generate an approval link for the containment action and include the placeholder in the body of the 'Send Email' action. Configure additional playbook logic to manage approved or denied containment actions.

Buy Now
Questions 6

You are a platform engineer at an organization that is migrating from a third-party SIEM product to Google Security Operations (SecOps). You previously manually exported context data from Active Directory (AD) and imported the data into your previous SIEM as a watchlist when there were changes in AD's user/asset context data. You want to improve this process using Google SecOps. What should you do?

Options:

A.

Ingest AD organizational context data as user/asset context to enrich user/asset information in your security events.

B.

Configure a Google SecOps SOAR integration for AD to enrich user/asset information in your security alerts.

C.

Create a data table that contains AD context data. Use the data table in your YARA-L rule to find user/asset data that can be correlated within each security event.

D.

Create a data table that contains the AD context data. Use the data table in your YARA-L rule to find user/asset information for each security event.

Buy Now
Questions 7

Your Google Security Operations (SecOps) case queue contains a case with IP address entities. You need to determine whether the entities are internal or external assets and ensure that internal IP address entities are marked accordingly upon ingestion into Google SecOps SOAR. What should you do?

Options:

A.

Configure a feed to ingest enrichment data about the networks, and include these fields into your detection outcome.

B.

Modify the connector logic to perform a secondary lookup against your CMDB and flag incoming entities as internal or external.

C.

Indicate your organization's known internal CIDR ranges in the Environment Networks list in the settings.

D.

Create a custom action to ping the IP address entity from your Remote Agent. If successful, the custom action designates the IP address entity as internal.

Buy Now
Questions 8

Your company's SOC recently responded to a ransomware incident that began with the execution of a malicious document. EDR tools contained the initial infection. However, multiple privileged service accounts continued to exhibit anomalous behavior, including credential dumping and scheduled task creation. You need to design an automated playbook in Google Security Operations (SecOps) SOAR to minimize dwell time and accelerate containment for future similar attacks. Which action should you take in your Google SecOps SOAR playbook to support containment and escalation?

Options:

A.

Create an external API call to VirusTotal to submit hashes from forensic artifacts.

B.

Add an approval step that requires an analyst to validate the alert before executing a containment action.

C.

Configure a step that revokes OAuth tokens and suspends sessions for high-privilege accounts based on entity risk.

D.

Add a YARA-L rule that sends an alert when a document is executed using a scripting engine such as wscript.exe.

Buy Now
Questions 9

You scheduled a Google Security Operations (SecOps) report to export results to a BigQuery dataset in your Google Cloud project. The report executes successfully in Google SecOps, but no data appears in the dataset. You confirmed that the dataset exists. How should you address this export failure?

Options:

A.

Grant the Google SecOps service account the roles/iam.serviceAccountUser IAM role to itself.

B.

Set a retention period for the BigQuery export.

C.

Grant the user account that scheduled the report the roles/bigquery.dataEditor IAM role on the project.

D.

Grant the Google SecOps service account the roles/bigquery.dataEditor IAM role on the dataset.

Buy Now
Questions 10

You have a custom-built YARA-L rule in Google Security Operations (SecOps) correlating observed IP addresses in network and EDR logs against threat intelligence findings ingested from a Malware Information Sharing Platform (MISP) over a 2-minute time window. Your company's SOC reported that the rule generates too many false positives. You want to reduce the number of false positives generated by the rule while continuing to use threat intelligence.

What should you do?

Options:

A.

Convert the rule to a dashboard, and use a match window of 24 hours to visualize entities in a bar chart.

B.

Modify the rule to alert only when the graph.metadata.threat.severity value is critical or high.

C.

Modify the rule to trigger only when the ICCs graph.risk_score.risk_score field exceeds 500.

D.

Adjust the match window in the rule to 24 hours to aggregate IP addresses by asset once a day.

Buy Now
Questions 11

You are ingesting and parsing logs from an SSO provider and an on-premises appliance using Google Security Operations (SecOps). Users are tagged as "restricted" by an internal process. Restrictions last five days from the most recent flagging time. You need to create a rule to detect when restricted users log into the appliance. Your solution must be quickly implemented and easily maintained.

What should you do?

Options:

A.

Use a Google SecOps SOAR global context value to store a list of flagged users with their corresponding time-to-live values.

B.

Use a SOAR job to dynamically build and deploy a new version of the detection rule with the updated list of flagged users.

C.

Store the flagged users in a data table column with their corresponding time-to-live values in a second column. Use row-based comparisons in the detection rule.

D.

Create a regex data table to store each user and the corresponding time-to-live value in a single row, pipe-delimited, and use an "in" keyword in your detection rule.

Buy Now
Questions 12

Your organization uses the curated detection rule set in Google Security Operations (SecOps) for high priority network indicators. You are finding a vast number of false positives coming from your on-premises proxy servers. You need to reduce the number of alerts. What should you do?

Options:

A.

Configure a rule exclusion for the target.ip field.

B.

Configure a rule exclusion for the principal.ip field.

C.

Configure a rule exclusion for the network.asset.ip field.

D.

Configure a rule exclusion for the target.domain field.

Buy Now
Questions 13

You are responsible for evaluating the level of effort required to integrate a new third-party endpoint detection tool with Google Security Operations (SecOps). Your organization's leadership wants to minimize customization for the new tool for faster deployment. You need to verify that the Google SecOps SOAR and SIEM support the expected workflows for the new third-party tool. You must recommend a tool to your leadership team as quickly as possible. What should you do?

Choose 2 answers

Options:

A.

Review the architecture of the tool to identify the cloud provider that hosts the tool.

B.

Review the documentation to identify if default parsers exist for the tool, and determine whether the logs are supported and able to be ingested.

C.

Identify the tool in the Google SecOps Marketplace, and verify support for the necessary actions in the workflow.

D.

Develop a custom integration that uses Python scripts and Cloud Run functions to forward logs and orchestrate actions between the third-party tool and Google SecOps.

E.

Configure a Pub/Sub topic to ingest raw logs from the third-party tool, and build custom YARA-L rules in Google SecOps to extract relevant security events.

Buy Now
Questions 14

You recently joined a company that uses Google Security Operations (SecOps) with Applied Threat Intelligence enabled. You have alert fatigue from a recent red team exercise, and you want to reduce the amount of time spent sifting through noise. You need to filter out IoCs that you suspect were generated due to the exercise. What should you do?

Options:

A.

Ask Gemini to provide a list of IoCs from the red team exercise.

B.

Filter IoCs with an ingestion time that matches the time period of the red team exercise.

C.

Navigate to the IOC Matches page. Identify and mute the IoCs from the red team exercise.

D.

Navigate to the IOC Matches page. Review IoCs with an Indicator Confidence Score (IC-Score) label >= 80%.

Buy Now
Questions 15

Your company requires PCI DSS v4.0 compliance for its cardholder data environment (CDE) in Google Cloud. You use a Security Command Center (SCC) security posture deployment based on the PCI DSS v4.0 template to monitor for configuration drift.1 This posture generates a finding indicating that a Compute Engine VM within the CDE scope has been configured with an external IP address. You need to take an immediate action to remediate the compliance drift identified by this specific SCC posture finding. What should you do?

Options:

A.

Enable and enforce the constraints/compute.vmExternalIpAccess organization policy constraint at the project level for the project where the VM resides.

B.

Remove the CDE-specific tag from the VM to exclude the tag from this particular PCI DSS posture evaluation scan.

C.

Reconfigure the network interface settings for the VM to explicitly remove the assigned external IP address.

D.

Navigate to the underlying Security Health Analytics (SHA) finding for public_ip_address on the VM. and mark this finding as fixed.

Buy Now
Questions 16

You are an incident responder at your organization using Google Security Operations (SecOps) for monitoring and investigation. You discover that a critical production server, which handles financial transactions, shows signs of unauthorized file changes and network scanning from a suspicious IP address. You suspect that persistence mechanisms may have been installed. You need to use Google SecOps to immediately contain the threat while ensuring that forensic data remains available for investigation. What should you do first?

Options:

A.

Use the firewall integration to submit the IP address to a network block list to inhibit internet access from that machine.

B.

Deploy emergency patches, and reboot the server to remove malicious persistence.

C.

Use the EDR integration to quarantine the compromised asset.

D.

Use VirusTotal to enrich the IP address and retrieve the domain. Add the domain to the proxy block list.

Buy Now
Questions 17

Your organization uses Google Security Operations (SecOps) for security analysis and investigation. Your organization has decided that all security cases related to Data Loss Prevention (DLP) events must be categorized with a defined root cause specific to one of five DLP event types when the case is closed in Google SecOps. How should you achieve this?

Options:

A.

Customize the Case Name format to include the DLP event type.

B.

Create case tags in Google SecOps SOAR where each tag contains a unique definition of each of the five DLP event types, and have analysts assign them to cases manually.

C.

Customize the Close Case dialog and add the five DLP event types as root cause options.

D.

Create a Google SecOps SOAR playbook that automatically assigns case tags where each tag contains the unique definition of one of the five DLP event types.

Buy Now
Questions 18

Your company's analyst team uses a playbook to make necessary changes to external systems that are integrated with the Google Security Operations (SecOps) platform. You need to automate the task to run once every day at a specific time. You want to use the most efficient solution that minimizes maintenance overhead.

Options:

A.

Write a custom Google SecOps SOAR job in the IDE using the code from the existing playbook actions.

B.

Create a Cron Scheduled Connector for this use case. Configure a playbook trigger to match the cases created by the connector that runs the playbook with the relevant actions.

C.

Create a Google SecOps SOAR request and a playbook trigger to match the request from the user to start the playbook with the relevant actions.

D.

Use a VM to host a script that runs a playbook via an API call.

Buy Now
Exam Name: Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam
Last Update: Dec 14, 2025
Questions: 60
Security-Operations-Engineer pdf

Security-Operations-Engineer PDF

$25.5  $84.99
Security-Operations-Engineer Engine

Security-Operations-Engineer Testing Engine

$30  $99.99
Security-Operations-Engineer PDF + Engine

Security-Operations-Engineer PDF + Testing Engine

$40.5  $134.99