Module 4: Monitoring, Logging, Auditing and Scanning

Looking for ‘Mitigating Security Vulnerabilities on Google Cloud Module 4 Answers’?

In this post, I provide complete, accurate, and detailed explanations for the answers to Module 4: Monitoring, Logging, Auditing and Scanning of Course 11: Mitigating Security Vulnerabilities on Google Cloud – Preparing for Google Cloud Certification: Cloud Security Engineer Professional Certificate.

Whether you’re preparing for quizzes or brushing up on your knowledge, these insights will help you master the concepts effectively. Let’s dive into the correct answers and detailed explanations for each question!

Monitoring, Logging, Auditing and Scanning

Graded Assignment

1. Which TWO of the following statements about Cloud Monitoring and Cloud Logging are TRUE?

  • The Cloud Logging Agent can be installed on both Compute Engine and AWS EC2 instances. ✅
  • While Cloud Logging is not built-in to most Google Cloud services, you can easily add it for a reasonable fee.
  • You can analyze log data in BigQuery. ✅
  • Cloud Monitoring and Cloud Logging retain logs for an indefinite period of time.

2. Which TWO of the following statements about Cloud Audit Logs are TRUE?

  • Unlike Cloud Logging logs, you cannot export Cloud Audit Logs entries to BigQuery.
  • Cloud Audit Logs maintains four audit logs for each project, folder, and organization. ✅
  • Data Access audit logs record data-access operations on resources that are publicly shared.
  • Enabling Data Access audit logs might result in your project being charged for the additional logs usage. ✅

3. Which one of the following statements about Security Command Center is NOT true?

  • Security Command Center works by generating “findings” associated with assets.
  • Security Command Center provides a centralized view for cloud resources.
  • Security Command Center helps you prevent, detect, and respond to threats.
  • Security Command Center requires three IAM administrative permissions to set up ✅

4. Which one of the following is NOT a benefit for automating security in Google Cloud environments?

  • While beneficial in some situations, the time invested in automating certain tasks is not worth it due to a lack of Google Cloud services that support this framework. ✅
  • Once you have encapsulated some task in automation, anyone can execute the task.
  • Security automation Improves consistency, quickness, and reliability.
  • Security automation allows scaling faster than the growth of threats and assets.

Explanation:
This statement is not a benefit and is therefore the correct answer. Google Cloud actually supports extensive automation frameworks (Cloud Functions, Cloud Scheduler, Pub/Sub, etc.), making automation highly beneficial.

Leave a Reply