Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCFR - GIAC Cloud Forensics Responder (GCFR)

Page: 1 / 3
Total 82 questions

At what point of the OAuth delegation process does the Resource Owner approve the scope of access to be allowed?

A.

After user credentials are accepted by the Authorization Server

B.

Once the OAuth token is accepted by the Application

C.

When the Resource Server receives the OAuth token

D.

Before user credentials are sent to the Authentication Server

What is the lowest level of GCP organization that consists of a logical grouping of services?

A.

Project

B.

Folder

C.

Organization

D.

Unit

Which statement describes a zld.metal EC2 instance?

A.

It Is an accelerated computing system with a GPU or I PGA

B.

The system can be configured to add resources at a trigger point

C.

It is a high-frequency system with very fast RAM access

D.

The system is optimized for a high CPU-to-memory ratio

Access Kibana via http://10.0.1.7:5601 and use the azure-* index pattern. Between March 31st, 2021 and April 3rd, 2021, how many virtual machines were created that use a Linux operating system?

A.

4

B.

6

C.

5

D.

2

E.

3

F.

8

G.

7

An engineer has set up log forwarding for a new data source and wants to use that data to run reports and create dashboards in Kibana. What needs to be created in order to properly handle these logs?

A.

Row

B.

Parser

C.

ingest script

D.

Beat

What can bedetermine about the AVVS Access Key below?

AKIAVNKBKCM4I3VNZIS3

A.

The key belongs to a user account

B.

The key will only work internally

C.

It is a service STS token

D.

It is only in use for a single session

What is the example AWS data below an example of?

A.

EC2 Configuration

B.

S3 Configuration

C.

Network Security Group

D.

IAM Policy

Which of the following Windows agents would need to be configured on an Azure VM for an investigator to query Its operating system logs sent to Azure Storage?

A.

Azure Monitor

B.

Diagnostic Extension

C.

Dependency

D.

Log Analytics

An engineer is troubleshooting a complaint that a web server in AWS cannot receive incoming traffic, but the server can connect to the internet otherwise. What is needed to solve this problem?

A.

VPC Subnet

B.

NAT Gateway

C.

Network Security Group

D.

Internet Gateway

Which cloud service provider produces sampled flow logs?

A.

GCP

B.

Azure

C.

AWS