Question 60:
You are part of a security team investigating a compromised service account key. You need to audit which new resources were created by the service account. What should you do?
Answer options:
A. Query Data Access logs. B. Query Admin Activity logs. C. Query Access Transparency logs. D. Query Stackdriver Monitoring Workspace.