GIAC Cloud Forensics Responder (GCFR) GCFR Question # 2 Topic 1 Discussion

GIAC Cloud Forensics Responder (GCFR) GCFR Question # 2 Topic 1 Discussion

GCFR Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

Sensitive company data is found leaked on the internet, and the security team didn't

get any alert and is unsure of how the breach occurred.

Which logs would be a preferable starting point for an investigation?


A.

Identity and Access Management


B.

Application


C.

Resource Management


D.

Endpoint


Get Premium GCFR Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.