Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFR Practice Exam with Questions & Answers

Questions 1

An analyst investigating a malicious application determines that it runs using AVVS Lambda. What challenge will the analyst likely encounter during the Investigation?

Options:
A.

Application Is no longer active

B.

Hardware raps are misconfigured

C.

Large amounts of log data

D.

Server is poorly managed

GIAC GCFR Premium Access
Questions 2

A data exfiltrationinvestigation of a GCP storage bucket is limited to the information logged by default in the Cost Table of Google's Cloud Billing. What information will investigators be able to gather?

Options:
A.

IP addresses associated with file downloads

B.

Timeframes of file downloads

C.

Filenames of downloaded files

D.

Usernames associated with file downloads

Questions 3

What logical AWS structure type is used to chain together accounts in a trust relationship which allows for single sign-on and cross-account management?

Options:
A.

Subscription

B.

Organisation

C.

OU

D.

Tenant

Questions 4

In which scenario would an investigator collect NetFlow logs rather than PCAP logs?

Options:
A.

To save on storage space

B.

For detailed network monitoring

C.

For deep packet inspection

D.

To collect application layer data

Questions 5

Which of the following actions described below would populate the suggestions table on an Android phone?

Options:
A.

Google Maps recommends locations, which are cached in the table

B.

Google Maps tracks previously entered destinations by the user

C.

The table contains previously saved or bookmarked destinations

Questions 6

An investigator his successfully installed the ExchangeOnlineManagement module on their investigation system and is attempting to search a client's Microsoft 365 Unified Audit Log using PowerShell. PowerShell returns a "command not found" error each time they try to execute the Search-UnifiedAuditLog cmdlet. How should the investigator troubleshoot this issue?

Options:
A.

Ensure their system has .NFT version 4.b or later Installed

B.

Ensure that MFA has been disabled for The account used

C.

Check that they are using PowerShell Core

D.

Check the permissions of the account used in Microsoft 365

Questions 7

What method does Google use to alert Gmail account holders that they may be under attack by government sponsored attackers?

Options:
A.

Message upon successful logon

B.

SMS text message

C.

Email sent to the user

D.

Alert sent to recovery account

Questions 8

What information do AWS VPC flow logs collect?

Options:
A.

Details of all traffic transmitted in or out of the VPC

B.

Traffic between end point and load balancer interfaces

C.

Contents of network traffic

D.

Length of network connections

Questions 9

The Azure PowerShell output below is an example of which of the following?

GCFR Question 9

Options:
A.

Role assignment

B.

Managed identity

C.

Role definition

D.

Service principal

Questions 10

At what organizational level are EC2 services managed by customers?

Options:
A.

Data center

B.

Regional

C.

Global

D.

Continental