The purpose of this Sample Question Set is to provide you with information about the GIAC Cloud Forensics Responder (GCFR) exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the GCFR certification test. To get familiar with real exam environment, we suggest you try our Sample GIAC GCFR Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual GIAC Cloud Forensics Responder (GCFR) certification exam.
These sample questions are simple and basic questions that represent likeness to the real GIAC Cloud Forensics Responder exam questions. To assess your readiness and performance with real-time scenario based questions, we suggest you prepare with our Premium GIAC GCFR Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.
GIAC GCFR Sample Questions:
01. Which EBS volume type is most suitable for supporting a business-critical SQL Server in AWS requiring high IOPS and durability?
a) ST1
b) GP3
c) GP2
d) I02
02. After registering the application in Azure AD, what is the next step to take in order to use Microsoft Graph API?
a) Request access tokens from Azure An
b) Call the Graph API
c) Configure app permission
d) Get Microsoft 365 global admin approval
03. What logical AWS structure type is used to chain together accounts in a trust relationship which allows for single sign-on and cross-account management?
a) Subscription
b) Organisation
c) OU
d) Tenant
04. Sensitive company data is found leaked on the internet, and the security team didn't get any alert and is unsure of how the breach occurred. Which logs would be a preferable starting point for an investigation?
a) Identity and Access Management
b) Application
c) Resource Management
d) Endpoint
05. An engineer has set up log forwarding for a new data source and wants to use that data to run reports and create dashboards in Kibana. What must be created to structure and properly interpret these logs?
a) Row
b) Parser pipeline or index pattern
c) ingest script
d) Beat
06. The attack technique "Access Kubelet API" falls under which Mitre ATT&CK tactic?
a) Execution
b) Credential Access
c) Discovery
d) Initial Access
07. In Azure, which of the following describes a "Contributor"?
a) A collection of permissions such as read, write, and delete
b) A designation on a PKI certificate
c) A specification of who can access a resource group
d) An object representing an entity
08. What approach can be used to enable Mac instances on AWS?
a) Emulating the M1 processor using ARM clusters
b) Installing OS X exclusively on I (Burstable) instance
c) Using physical Mac computers in the data center
d) Virtualizing OS X on Unix servers
09. Which of the following is the smallest deployable unit in Kubernetes used to run containers?
a) Cluster
b) Node
c) Container
d) Pod
10. At what stage in the OAuth flow does the Resource Owner approve the requested scope of access?
a) During authorization at the Authorization Server
b) after authentication but before token issuance
c) When the Resource Server receives the OAuth token
d) Before user credentials are sent to the Authentication Server
Answers:
Question: 01
Answer: d |
Question: 02
Answer: c |
Question: 03
Answer: b |
Question: 04
Answer: a |
Question: 05
Answer: b |
Question: 06
Answer: c |
Question: 07
Answer: a |
Question: 08
Answer: c |
Question: 09
Answer: d |
Question: 10
Answer: a, b |
Note: For any error in GIAC Cloud Forensics Responder (GCFR) certification exam sample questions, please update us by writing an email on feedback@edusum.com.