Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What tool did David use to gain full visibility while investigating a Google Cloud security incident?

  1. Dynatrace

  2. CloudTrail

  3. Service Account

  4. Cloud Monitoring

The correct answer is: Dynatrace

In the context of investigating a Google Cloud security incident, Dynatrace stands out as a tool that provides full visibility into application performance monitoring and user experiences. It offers insights into the complete technology stack, enabling investigators to trace transactions, monitor performance, and detect anomalies. This level of visibility is crucial when assessing the impact of any security incidents, allowing responders to analyze the behavior of applications and infrastructure in real-time. Other tools mentioned may play a role in cloud security but do not provide the comprehensive overview that Dynatrace offers. For instance, CloudTrail is primarily used for logging and monitoring actions taken within the AWS environment, which might not cater to Google Cloud specifically. Service Account refers to a type of account used to interact with services, but it does not provide monitoring capabilities. Cloud Monitoring can offer insights into the performance and health of applications but may not match the depth of visibility that Dynatrace provides through its detailed analytics and monitoring features. Thus, Dynatrace is recognized for its capability to deliver a holistic view during a security investigation, making it the appropriate choice.