Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFR - GIAC Cloud Forensics Responder (GCFR)

Page: 3 / 3
Total 82 questions

What unique identifier is used by AWS to identify a specific account and allow integration with external organizations?

A.

Public Key

B.

Token

C.

ARN

D.

SID

An attacker successfully downloaded sensitive data from a misconfigured GCP bucket. Appropriate logging was not enabled. Where can an analyst find the rough time and quantity of the data downloaded?

A.

Billing Section

B.

C;loud Trace

C.

Cloud Logging

D.

Security Command Center

A client was responsible for their environment's OS, then they delegated this responsibility to their cloud provider. Which of the following migrations could describe this scenario?

A.

On-prern to UdS

B.

SaaStoOn-prem

C.

IaaS to PaaS

D.

PaaS to SaaS

What approach can be used to enable Mac instances on AWS?

A.

Emulating the M1 processor using ARM clusters

B.

Installing OS X exclusively on I (Burstable) instance

C.

Using physical Mac computers in the data center

D.

Virtualizing OS X on Unix servers