
Ultimate access to all questions.
You need to investigate a potential security incident where a former employee may have used a service account key for unauthorized access to Google Cloud resources within the last two months. How should you proceed to confirm this access and identify the user's activities?
A
Use Security Health Analytics to determine user activity.
B
Use the Cloud Monitoring console to filter audit logs by user.
C
Use the Cloud Data Loss Prevention API to query logs in Cloud Storage.
D
Use the Logs Explorer to search for user activity.