An attacker successfully downloaded sensitive data from a misconfigured GCP bucket. Appropriate logging was not enabled. Where can an analyst find the rough time and quantity of the data downloaded?
Hmm, let's see... Billing Section, Cloud Trace, Cloud Logging, Security Command Center. Sounds like a bad comedy routine. I'll take 'Cloud Logging' for 500, Alex!
D) Security Command Center sounds fancy, but I doubt it'll have the specifics we need here. Gotta stick with the basics - Cloud Logging is where it's at.
C) Cloud Logging is the way to go! That's where you'll find the details on the data download. Gotta love those logs, they're the bread and butter of any good security investigation.
C) Cloud Logging is the way to go! That's where you'll find the details on the data download. Gotta love those logs, they're the bread and butter of any good security investigation.
Johnathon
1 months agoClarence
3 days agoDenae
9 days agoLauran
2 months agoYvonne
6 days agoYuki
7 days agoGlory
8 days agoGeorgiana
13 days agoFlorinda
17 days agoShannon
1 months agoFelix
1 months agoYoko
2 months agoAllene
2 months agoGianna
2 months agoElvera
2 months agoNichelle
2 months agoLasandra
2 months agoCarin
2 months agoAlexis
20 days agoKris
21 days agoCherrie
1 months agoBenedict
2 months agoShonda
2 months agoMike
3 months ago