The purpose of this Sample Question Set is to provide you with information about the GIAC Cloud Forensics Responder (GCFR) exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the GCFR certification test. To get familiar with real exam environment, we suggest you try our Sample GIAC GCFR Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual GIAC Cloud Forensics Responder (GCFR) certification exam.
These sample questions are simple and basic questions that represent likeness to the real GIAC Cloud Forensics Responder exam questions. To assess your readiness and performance with real-time scenario based questions, we suggest you prepare with our Premium GIAC GCFR Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.
GIAC GCFR Sample Questions:
01. Which EBS volume type would be appropriate to support a business critical SQL server hosted In AWS?
a) ST1
b) GP3
c) GP2
d) I01
02. After registering the application in Azure AD, what is the next step to take in order to use Microsoft Graph API?
a) Request access tokens from Azure An
b) Call the Graph API
c) Configure app permission
d) Get Microsoft 365 global admin approval
03. What logical AWS structure type is used to chain together accounts in a trust relationship which allows for single sign-on and cross-account management?
a) Subscription
b) Organisation
c) OU
d) Tenant
04. Sensitive company data is found leaked on the internet, and the security team didn't get any alert and is unsure of how the breach occurred. Which logs would be a preferable starting point for an investigation?
a) Identity and Access Management
b) Application
c) Resource Management
d) Endpoint
05. An engineer has set up log forwarding for a new data source and wants to use that data to run reports and create dashboards in Kibana. What needs to be created in order to properly handle these logs?
a) Row
b) Parser
c) ingest script
d) Beat
06. The attack technique "Access Kubelet API" falls under which Mitre ATT&CK tactic?
a) Execution
b) Credential Access
c) Discovery
d) Initial Access
07. In Azure, which of the following describes a "Contributor"?
a) A collection of permissions such as read, write, and delete
b) A designation on a PKI certificate
c) A specification of who can access a resource group
d) An object representing an entity
08. What approach can be used to enable Mac instances on AWS?
a) Emulating the M1 processor using ARM clusters
b) Installing OS X exclusively on I (Burstable) instance
c) Using physical Mac computers in the data center
d) Virtualizing OS X on Unix servers
09. Which of the following is the smallest unit of computing hardware in Kubernetes?
a) Cluster
b) Node
c) Container
d) Pod
10. At what point of the OAuth delegation process does the Resource Owner approve the scope of access to be allowed?
a) After user credentials are accepted by the Authorization Server
b) Once the OAuth token is accepted by the Application
c) When the Resource Server receives the OAuth token
d) Before user credentials are sent to the Authentication Server
Answers:
Question: 01
Answer: d |
Question: 02
Answer: c |
Question: 03
Answer: b |
Question: 04
Answer: a |
Question: 05
Answer: b |
Question: 06
Answer: c |
Question: 07
Answer: a |
Question: 08
Answer: c |
Question: 09
Answer: d |
Question: 10
Answer: a |
Note: For any error in GIAC Cloud Forensics Responder (GCFR) certification exam sample questions, please update us by writing an email on feedback@edusum.com.