Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

GCFR GIAC Cloud Forensics Responder (GCFR) Questions and Answers

Questions 4

What is the example AWS data below an example of?

GCFR Question 4

Options:

A.

EC2 Configuration

B.

S3 Configuration

C.

Network Security Group

D.

IAM Policy

Buy Now
Questions 5

A company using PaaS to host and develop their software application is experiencing a DOS attack. What challenge will a DFIR analyst experience when investigating this attack?

Options:

A.

Restricted access to their application logs

B.

Resource scaling will affect access to logs

C.

Network logs are unavailable for review

D.

Network monitoring disabled by the company

Buy Now
Questions 6

What approach can be used to enable Mac instances on AWS?

Options:

A.

Emulating the M1 processor using ARM clusters

B.

Installing OS X exclusively on I (Burstable) instance

C.

Using physical Mac computers in the data center

D.

Virtualizing OS X on Unix servers

Buy Now
Questions 7

What is the recommended storage type when creating an initial snapshot of a VM in Azure for forensic analysis?

Options:

A.

Standard SSD

B.

Ultra Disk

C.

Premium SSD

D.

Standard HDD

Buy Now
Questions 8

An attacker successfully downloaded sensitive data from a misconfigured GCP bucket. Appropriate logging was not enabled. Where can an analyst find the rough time and quantity of the data downloaded?

Options:

A.

Billing Section

B.

C;loud Trace

C.

Cloud Logging

D.

Security Command Center

Buy Now
Questions 9

At what point of the OAuth delegation process does the Resource Owner approve the scope of access to be allowed?

Options:

A.

After user credentials are accepted by the Authorization Server

B.

Once the OAuth token is accepted by the Application

C.

When the Resource Server receives the OAuth token

D.

Before user credentials are sent to the Authentication Server

Buy Now
Questions 10

What type of AWS log is the following snippet an example of?

GCFR Question 10

Options:

A.

Web Application firewall Log

B.

VPC Flow Log

C.

Load Balancer Log

D.

Route 53 Query Log

Buy Now
Questions 11

What information do AWS VPC flow logs collect?

Options:

A.

Details of all traffic transmitted in or out of the VPC

B.

Traffic between end point and load balancer interfaces

C.

Contents of network traffic

D.

Length of network connections

Buy Now
Questions 12

Sensitive company data is found leaked on the internet, and the security team didn't

get any alert and is unsure of how the breach occurred.

Which logs would be a preferable starting point for an investigation?

Options:

A.

Identity and Access Management

B.

Application

C.

Resource Management

D.

Endpoint

Buy Now
Questions 13

The Azure PowerShell output below is an example of which of the following?

GCFR Question 13

Options:

A.

Role assignment

B.

Managed identity

C.

Role definition

D.

Service principal

Buy Now
Questions 14

Communication between the VPN client and Azure VNet1via VPN Tunnel #1 is using which of the following connections?

GCFR Question 14

Options:

A.

Point-to-site VPN

B.

IPSec

Buy Now
Questions 15

An investigator is evaluating a client's Microsoft 365 deployment using the web portals and has identified that the Purview compliance portal states that the Unified Audit Logs are not enabled. Based on the additional Information gathered below, what is most likely the cause of this configuration message?

Subscription creation date: December 4, 2021 Number of administrators: 2 Number of non-administrative user accounts: 74 Last tenant administration change: December 4,2021

Options:

A.

Explicitly been disabled by an administrator

B.

License was downgraded lower than an E5 license

C.

Tenant is configured to forward logs externally

D.

Default configuration, service was never enabled

Buy Now
Questions 16

What is the lowest level of GCP organization that consists of a logical grouping of services?

Options:

A.

Project

B.

Folder

C.

Organization

D.

Unit

Buy Now
Questions 17

An investigator his successfully installed the ExchangeOnlineManagement module on their investigation system and is attempting to search a client's Microsoft 365 Unified Audit Log using PowerShell. PowerShell returns a "command not found" error each time they try to execute the Search-UnifiedAuditLog cmdlet. How should the investigator troubleshoot this issue?

Options:

A.

Ensure their system has .NFT version 4.b or later Installed

B.

Ensure that MFA has been disabled for The account used

C.

Check that they are using PowerShell Core

D.

Check the permissions of the account used in Microsoft 365

Buy Now
Questions 18

Which is a limitation when adding GPUs to Google cloud VMs?

Options:

A.

They can only be added at VM creation

B.

Preemptible VMs do not support GPU addition

C.

Google limits the GPUs assigned to a single VM

D.

They are only available in specific zones

Buy Now
Questions 19

An Azure blob is accessed using the link below. What is the name of the blob container?

GCFR Question 19

Options:

A.

ex-storage

B.

mov.avi

C.

mymovies

D.

blob.core

Buy Now
Questions 20

After registering the application in Azure AD, what is the next step to take in order to use Microsoft Graph API?

Options:

A.

Request access tokens from Azure An

B.

Call the Graph API

C.

Configure app permission

D.

Get Microsoft 365global admin approval

Buy Now
Questions 21

What can bedetermine about the AVVS Access Key below?

AKIAVNKBKCM4I3VNZIS3

Options:

A.

The key belongs to a user account

B.

The key will only work internally

C.

It is a service STS token

D.

It is only in use for a single session

Buy Now
Questions 22

The Azure URI for the Develop VM is shown below. What will change in the notation when referencing the VM's OS disk?

GCFR Question 22

Options:

A.

Resource Type

B.

Provider

C.

Resource Group

D.

Subscription ID

Buy Now
Questions 23

Which is a limitation of AWS Lambdas?

Options:

A.

Functions must run in less than 15 minutes

B.

They can be quite costly to operate

C.

Managing systems can be time consuming

D.

They only support up to 256 MB of storage

Buy Now
Exam Code: GCFR
Exam Name: GIAC Cloud Forensics Responder (GCFR)
Last Update: May 14, 2024
Questions: 82

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now GCFR testing engine

PDF (Q&A)

$42  $104.99
buy now GCFR pdf