
Answer-first summary for fast verification
Answer: Packet Mirroring
The question asks for a Google Cloud product to analyze network payloads and headers, moving beyond just network logs. Packet Mirroring (E) is the correct answer because it specifically clones all network traffic (including payloads and headers) from VPC instances for deep inspection, which aligns with the requirement to explore the environment using payloads and headers. While Cloud IDS (A) uses packet mirroring internally for threat detection, it is a managed service focused on intrusion detection rather than raw packet capture for general analysis. VPC Service Controls logs (B) and VPC Flow Logs (C) only provide metadata and flow information without payloads. Google Cloud Armor (D) is a web application firewall for DDoS protection and does not capture full packet data. The community discussion shows strong support for E (80% of answers), with the highest upvoted comment (10 upvotes) confirming Packet Mirroring captures all traffic and packet data, including payloads and headers.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
You manage your organization's Security Operations Center (SOC) and currently monitor for network traffic anomalies in your VPCs using network logs. You now want to analyze your environment using network payloads and headers. Which Google Cloud product should you use?
A
Cloud IDS
B
VPC Service Controls logs
C
VPC Flow Logs
D
Google Cloud Armor
E
Packet Mirroring
No comments yet.