When selecting Integration packages in the Google SecOps Marketplace, which of the following will NOT be contained in any package?
- Webhooks
- Actions
- Mapping rules
- Connectors
Home » Google Cloud SecOps Technical Credential Assessment Answers
Google Cloud SecOps Technical Credential Assessment Answers
This assessment will test your knowledge of the SecOps (Chronical and Mandiant) products. You must achieve a score of 80% or higher to receive the technical credential.
50 questions
Questions:
When data is ingested into Google SecOps, when is the raw data discarded?
Which of the following data sources can be configured as a Direct ingestion data source?
Chronicle SIEM had a Legacy RBAC system that was replaced with what GCP technology?
When using the SOAR interface in Google SecOps which view is applied to all cases automatically?
The rule language in Google SecOps was designed for what purpose?
What three components make up the Google SecOps Entity Context Graph (ECG).
Which Google SecOps capability reduces operator toil and MTTR?
What API must be enabled with a project to allow it to bind to Google SecOps?
What authentication methods are currently supported for a Google SecOps tenant?
How many regions can an MSSP tenant support?
How many Google SecOps tenants can be bound to a single GCP project?
There are two methods that can be used to manage Google SecOps parsers (CBNs), what are they?
The Google SecOps search interface provides two methods to search data. What are they?
What is the name of the API that enables users to create and manage rules?
By vmartinez
When selecting Integration packages in the Google SecOps Marketplace, which of the following will NOT be contained in any package?
By vmartinez
A core function of Google SecOps is to collect information and present it in a way that it is actionable by humans or automation. What is the logical order of SOAR elements and their grouping?
By vmartinez
Google SecOps has functions within the SOAR components that allow you to group alerts via what mechanism?
By vmartinez
Events are modelled into Visual Families based on a hierarchy. What is the best representation of that hierarchy?
By vmartinez
When grouping alerts by entities it can be possible to group too many alerts because the entity occurs often within your logs. This can interfere with case triage and incident investigation by attaching irrelevant alerts. What feature can you use to prevent this from happening?
By vmartinez
In Google SecOps, UDM is a schema that applies structure to the data for faster search and enrichment among many other benefits. What does UDM stand for?