
Answer-first summary for fast verification
Answer: Admin Activity logs, Data Access logs
The question asks for log types that track 'who did what, where, and when' for secrets management in GCP. Admin Activity logs (A) capture all administrative actions, including secret creation, deletion, and policy changes, providing the 'who, what, where, and when' for administrative operations. Data Access logs (C) record data access operations, such as reading or accessing secrets, which is critical for tracking who accessed sensitive data and when. The community discussion unanimously supports AC, with references to GCP documentation confirming these logs cover secret management activities. VPC Flow logs (D) track network traffic but not user actions on secrets. Agent logs (E) are application-specific and not centralized for GCP secret auditing. System Event logs (B) capture system-generated events but lack detailed user action tracking for secrets.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Applications need access to small pieces of sensitive data, known as secrets, during build or runtime. An administrator wants to track who did what, where, and when for these secrets within their GCP projects.
Which two log types provide this information? (Choose two.)
A
Admin Activity logs
B
System Event logs
C
Data Access logs
D
VPC Flow logs
E
Agent logs
No comments yet.