GIAC GCFR GIAC Cloud Forensics Responder (GCFR) Online Training
GIAC GCFR Online Training
The questions for GCFR were last updated at Nov 23,2024.
- Exam Code: GCFR
- Exam Name: GIAC Cloud Forensics Responder (GCFR)
- Certification Provider: GIAC
- Latest update: Nov 23,2024
An investigator his successfully installed the ExchangeOnlineManagement module on their investigation system and is attempting to search a client’s Microsoft 365 Unified Audit Log using PowerShell. PowerShell returns a "command not found" error each time they try to execute the Search-UnifiedAuditLog cmdlet.
How should the investigator troubleshoot this issue?
- A . Ensure their system has .NFT version 4.b or later Installed
- B . Ensure that MFA has been disabled for The account used
- C . Check that they are using PowerShell Core
- D . Check the permissions of the account used in Microsoft 365
The attack technique "Access Kubelet API" falls under which Mitre ATT&CK tactic?
- A . Execution
- B . Credential Access
- C . Discovery
- D . Initial Access
An analyst successfully authenticated to Microsoft 365 using the following command.
What would cause the analyst to be unable to search UAL events for a specific time period?
Ps> connect fxrhangeOnline userPrincipalName sysanalystatexanpteco.com
- A . The tmdlets to search the UAl were not Imported into the session
- B . The UAL cannot be searched when using Microsoft 365 PowerShell
- C . The incorrect version of the FxhangeOnlineManagement module was installed
- D . The ExchangeOnlineManagement module was not installed
Which statement describes how an organization could use IPv6 in a Google Cloud deployment?
- A . IPv6 has to be configured for each compute node Individually
- B . IPv6 b enabled by default for global traffic between VPCs
- C . IPv6 is enabled by default for traffic within VPCs
- D . IPv6 needs to be terminated at an edge load balancer
A company using PaaS to host and develop their software application is experiencing a DOS attack.
What challenge will a DFIR analyst experience when investigating this attack?
- A . Restricted access to their application logs
- B . Resource scaling will affect access to logs
- C . Network logs are unavailable for review
- D . Network monitoring disabled by the company
Which is a limitation when adding GPUs to Google cloud VMs?
- A . They can only be added at VM creation
- B . Preemptible VMs do not support GPU addition
- C . Google limits the GPUs assigned to a single VM
- D . They are only available in specific zones
What can be inferred about the ARN below?
arn:aws:!am::457787814323:user/giac
- A . giac’s is a user In the AWS account 457787814323
- B . giac’s access Is testf kted to resources owned by AWS tenant 457787814323
- C . giac’s Is limited to roles defined under a single AWS organization
- D . giac’s user’s access key 10 is 457787814323
What 1$ a drawback of analyzing a snapshot outside of AWS?
- A . Incomplete data
- B . Long download time
- C . Incompatible image format
- D . Low latency
Which of the following is available with the free tier of service for CloudTrail?
- A . Single trail of management events delivered to Amazon
- B . Access to data-related API Cloud Trail events
- C . Access to CloudTrail Insights to detect anomalies
- D . Default trail maintained by AWS for more than 90 days
Which EBS volume type would be appropriate to support a business critical SQL server hosted In AWS?
- A . ST1
- B . GP3
- C . GP2
- D . I01