Pass the GIAC Cyber Security GCFR Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

At what point of the OAuth delegation process does the Resource Owner approve the scope of access to be allowed?

Options:

A.

After user credentials are accepted by the Authorization Server


B.

Once the OAuth token is accepted by the Application


C.

When the Resource Server receives the OAuth token


D.

Before user credentials are sent to the Authentication Server


Questions # 2:

Sensitive company data is found leaked on the internet, and the security team didn't

get any alert and is unsure of how the breach occurred.

Which logs would be a preferable starting point for an investigation?

Options:

A.

Identity and Access Management


B.

Application


C.

Resource Management


D.

Endpoint


Questions # 3:

What is a best practice recommendation when using API keys for AWS access?

Options:

A.

Delete the account's default access keys


B.

Define specific role permissions


C.

Enable MFA protection


D.

Configure STS one-time tokens


Questions # 4:

AWS VPC Flow logs are enabled. What do these logs capture?

Options:

A.

TCP Checksums


B.

Packet Metadata


C.

TLS Handshakes


D.

Payload Bytes


Questions # 5:

What 1$ a drawback of analyzing a snapshot outside of AWS?

Options:

A.

Incomplete data


B.

Long download time


C.

Incompatible image format


D.

Low latency


Questions # 6:

How is storage account, cs21003200042c87633, created in an Azure resource group?

Options:

A.

PowerShell Cloud Shell audit logging was enabled


B.

A Bash Cloud Shell was used


C.

PowerShelI Cloud Shell was used


D.

Azure CLI was used from a Windows machine


Questions # 7:

What Azure SaaS option executes workflows instead of code?

Options:

A.

App Service


B.

Batch


C.

Logic Apps


D.

Functions


Questions # 8:

Which EBS volumetype would be appropriate to support a business critical SQL server hosted In AWS?

Options:

A.

ST1


B.

GP3


C.

GP2


D.

I01


Questions # 9:

A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack technique falls under which category of the Google Workspace MITRE ATT&CK matrix?

Options:

A.

Defense evasion


B.

Discovery


C.

Credential access


D.

Collection


Questions # 10:

An engineer is looking for the log of API calls recorded by CloudTrail for the past 6 months. Where should they look for the oldest data?

Options:

A.

Lambda ephemeral storage


B.

S3 bucket


C.

requestParameters


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions