Exam4Training

What should you do?

You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account.

What should you do?
A . Query Data Access logs.
B. Query Admin Activity logs.
C. Query Access Transparency logs.
D. Query Stackdriver Monitoring Workspace.

Answer: B

Explanation:

Reference: https://cloud.google.com/iam/docs/audit-logging/examples-service-accounts

Exit mobile version