Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Security-Operations-Engineer Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam Questions and Answers

Questions 4

You are responsible for identifying suspicious activity and security events in your organization's environment. You discover that some detection rules are generating false positives when the principal.ip field contains one or more IP addresses in the 192.168.2.0/24 subnet. You want to improve these detection rules using the principal.ip repeated field. What should you add to the YARA-L detection rules?

Options:

A.

net.ip_in_range_cidr(all $e.principal.ip, "192.168.2.0/24")

B.

net.ip_in_range_cidr(any $e.principal.ip, "192.168.2.0/24")

C.

not net.ip_in_range_cidr(all $e.principal.ip, "192.168.2.0/24")

D.

not net.ip_in_range_cidr(any $e.principal.ip, "192.168.2.0/24")

Buy Now
Questions 5

You have identified a common malware variant on a potentially infected computer. You need to find reliable IoCs and malware behaviors as quickly as possible to confirm whether the computer is infected and search for signs of infection on other computers. What should you do?

Options:

A.

Search for the malware hash in Google Threat Intelligence, and review the results.

B.

Run a Google Web Search for the malware hash, and review the results.

C.

Create a Compute Engine VM, and perform dynamic and static malware analysis.

D.

Perform a UDM search for the file checksum in Google Security Operations (SecOps). Review activities that are associated with, or attributed to, the malware.

Buy Now
Questions 6

You are implementing Google Security Operations (SecOps) for your organization. Your organization has their own threat intelligence feed that has been ingested to Google SecOps by using a native integration with a Malware Information Sharing Platform (MISP). You are working on the following detection rule to leverage the command and control (C2) indicators that were ingested into the entity graph.

What code should you add in the detection rule to filter for the domain IOCS?

Options:

A.

$ioc.graph.metadata.entity_type = MDOMAlN_NAME"

$ioc.graph.metadata.scurce_type = "ElfelTYj^ONTEXT"

B.

$ioc.graph.metadata.entity_type = "DOMAlN_NAME"

Sioc.graph.metadata.source_type = "GLOBAL_CONTEXT"

C.

$ioc.graph.metadata.entity_type = "D0MAIN_NAME"

$ioc.graph.metadata.source_type = MDERIVED_CONTEXT"

D.

$ioc.graph.metadata.entity_type = ,'D0MAIN_NAME*'

$ioc.graph.metadata.source type = "source type unspecified"

Buy Now
Questions 7

You received an alert from Container Threat Detection that an added binary has been executed in a business critical workload. You need to investigate and respond to this incident. What should you do?

Choose 2 answers

Options:

A.

Review the finding, quarantine the cluster containing the running pod. and delete the running pod to prevent further compromise.

B.

Keep the cluster and pod running, and investigate the behavior to determine whether the activity is malicious.

C.

Notify the workload owner. Follow the response playbook. and ask the threat hunting team to identify the root cause of the incident.

D.

Review the finding, investigate the pod and related resources, and research the related attack and response methods.

E.

Silence the alert in the Security Command Center (SCC) console, as the alert is a low severity finding.

Buy Now
Questions 8

You use Google Security Operations (SecOps) curated detections and YARA-L rules to detect suspicious activity on Windows endpoints. Your source telemetry uses EDR and Windows Events logs. Your rules match on the principal.user.userid UDM field. You need to ingest an additional log source for this field to match all possible log entries from your EDR and Windows Event logs. What should you do?

Options:

A.

Ingest logs from Microsoft Entra ID.

B.

Ingest logs from Windows Procmon.

C.

Ingest logs from Windows PowerShell.

D.

Ingest logs from Windows Sysmon.

Buy Now
Questions 9

You are a security engineer at a managed security service provider (MSSP) that is onboarding to Google Security Operations (SecOps). You need to ensure that cases for each customer are logically separated. How should you configure this logical separation?

Options:

A.

In Google SecOps SOAR settings, create a role for each customer.

B.

In Google SecOps Playbooks, create a playbook for each customer.

C.

In Google SecOps SOAR settings, create a permissions group for each customer.

D.

In Google SecOps SOAR settings, create a new environment for each customer.

Buy Now
Questions 10

You received an IOC from your threat intelligence feed that is identified as a suspicious domain used for command and control (C2). You want to use Google Security Operations (SecOps) to investigate whether this domain appeared in your environment. You want to search for this IOC using the most efficient approach. What should you do?

Options:

A.

Enable Group by Field in scan view to cluster events by hostname.

B.

Configure a UDM search that queries the DNS section of the network noun.

C.

Run a raw log search to search for the domain string.

D.

Enter the IOC into the IOC Search feature, and wait for detections with this domain to appear in the Case view.

Buy Now
Questions 11

You are an incident responder at your organization using Google Security Operations (SecOps) for monitoring and investigation. You discover that a critical production server, which handles financial transactions, shows signs of unauthorized file changes and network scanning from a suspicious IP address. You suspect that persistence mechanisms may have been installed. You need to use Google SecOps to immediately contain the threat while ensuring that forensic data remains available for investigation. What should you do first?

Options:

A.

Use the firewall integration to submit the IP address to a network block list to inhibit internet access from that machine.

B.

Deploy emergency patches, and reboot the server to remove malicious persistence.

C.

Use the EDR integration to quarantine the compromised asset.

D.

Use VirusTotal to enrich the IP address and retrieve the domain. Add the domain to the proxy block list.

Buy Now
Questions 12

You are using Google Security Operations (SecOps) to investigate suspicious activity linked to a specific user. You want to identify all assets the user has interacted with over the past seven days to assess potential impact. You need to understand the user's relationships to endpoints, service accounts, and cloud resources. How should you identify user-to-asset relationships in Google SecOps?

Options:

A.

Query for hostnames in UDM Search and filter the results by user.

B.

Run a retrohunt to find rule matches triggered by the user.

C.

Use the Raw Log Scan view to group events by asset ID.

D.

Generate an ingestion report to identify sources where the user appeared in the last seven days.

Buy Now
Questions 13

Your organization is a Google Security Operations (SecOps) customer. The compliance team requires a weekly export of case resolutions and SLA metrics of high and critical severity cases over the past week. The compliance team's post-processing scripts require this data to be formatted as tabular data in CSV files, zipped, and delivered to their email each Monday morning. What should you do?

Options:

A.

Generate a report in SOAR Reports, and schedule delivery of the report.

B.

Build a detection rule with outcomes, and configure a Google SecOps SOAR job to format and send the report.

C.

Build an Advanced Report in SOAR Reports, and schedule delivery of the report.

D.

Use statistics in search, and configure a Google SecOps SOAR job to format and send the report.

Buy Now
Questions 14

Your organization has mission-critical production Compute Engine VMs that you monitor daily. While performing a UDM search in Google Security Operations (SecOps), you discover several outbound network connections from one of the production VMs to an unfamiliar external IP address occurring over the last 48 hours. You need to use Google SecOps to quickly gather more context and assess the reputation of the external IP address. What should you do?

Options:

A.

Search for the external IP address in the Alerts & IoCs page in Google SecOps.

B.

Perform a UDM search to identify the specific user account that was logged into the production VM when the connections occurred.

C.

Examine the Google SecOps Asset view details for the production VM.

D.

Create a new detection rule to alert on future traffic from the external IP address.

Buy Now
Questions 15

You are developing a playbook to respond to phishing reports from users at your company. You configured a UDM query action to identify all users who have connected to a malicious domain. You need to extract the users from the UDM query and add them as entities in an alert so the playbook can reset the password for those users. You want to minimize the effort required by the SOC analyst. What should you do?

Options:

A.

Implement an Instruction action from the Flow integration that instructs the analyst to add the entities in the Google SecOps user interface.

B.

Use the Create Entity action from the Siemplify integration. Use the Expression Builder to create a placeholder with the usernames in the Entities Identifier parameter.

C.

Configure a manual Create Entity action from the Siemplify integration that instructs the analyst to input the Entities Identifier parameter based on the results of the action.

D.

Create a case for each identified user with the user designated as the entity.

Buy Now
Questions 16

Your company's analyst team uses a playbook to make necessary changes to external systems that are integrated with the Google Security Operations (SecOps) platform. You need to automate the task to run once every day at a specific time. You want to use the most efficient solution that minimizes maintenance overhead.

Options:

A.

Write a custom Google SecOps SOAR job in the IDE using the code from the existing playbook actions.

B.

Create a Cron Scheduled Connector for this use case. Configure a playbook trigger to match the cases created by the connector that runs the playbook with the relevant actions.

C.

Create a Google SecOps SOAR request and a playbook trigger to match the request from the user to start the playbook with the relevant actions.

D.

Use a VM to host a script that runs a playbook via an API call.

Buy Now
Questions 17

You need to augment your organization's existing Security Command Center (SCC) implementation with additional detectors. You have a list of known IoCs and would like to include external signals for this capability to ensure broad detection coverage. What should you do?

Options:

A.

Create a custom posture for your organization that combines the prebuilt Event Threat Detection and Security Health Analytics (SHA) detectors.

B.

Create a Security Health Analytics (SHA) custom module using the compute address resource.

C.

Create an Event Threat Detection custom module using the "Configurable Bad IP" template.

D.

Create a custom log sink with internal and external IP addresses from threat intelligence. Use the SCC API to generate a finding for each event.

Buy Now
Questions 18

A Google Security Operations (SecOps) detection rule is generating frequent false positive alerts. The rule was designed to detect suspicious Cloud Storage enumeration by triggering an alert whenever the storage.objects.list API operation is called using the api.operation UDM field. However, a legitimate backup automation tool that uses the same API, causing the rule to fire unnecessarily. You need to reduce these false positives from this trusted backup tool while still detecting potentially malicious usage. How should you modify the rule to improve its accuracy?

Options:

A.

Adjust the rule severity to low to deprioritize alerts from automation tools.

B.

Convert the rule into a multi-event rule that looks for repeated API calls across multiple buckets.

C.

Replace api.operation with api.service_name = "storage.googleapis.com" to narrow the detection scope.

D.

Add principal.user.email != "backup-bot@fcobaa.com" to the rule condition to exclude the automation account.

Buy Now
Exam Name: Google Cloud Certified - Professional Security Operations Engineer (PSOE) Exam
Last Update: Dec 8, 2025
Questions: 60

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now Security-Operations-Engineer testing engine

PDF (Q&A)

$49.8  $124.49
buy now Security-Operations-Engineer pdf