You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.
What should you do?
A . Query Data Access logs.
B. Query Admin Activity logs.
C. Query Access Transparency logs.
D. Query Stackdriver Monitoring Workspace.
Answer: B
Explanation:
Reference: https://cloud.google.com/iam/docs/audit-logging/examples-service-accounts
Latest Professional Cloud Security Engineer Dumps Valid Version with 93 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund