What is the name of the blob container?
An Azure blob is accessed using the link below. What is the name of the blob container? A . ex-storageB . mov.aviC . mymoviesD . blob.coreView AnswerAnswer: C
Which is the effective access when aws user is assigned to an S3 bucket?
Which is the effective access when aws user is assigned to an S3 bucket?A . A user must have an employee accountB . A user must have an account under any AWS accountC . A user must be under the same AWS account as the S3 bucketD . A user...
What would cause the analyst to be unable to search UAL events for a specific time period?
An analyst successfully authenticated to Microsoft 365 using the following command. What would cause the analyst to be unable to search UAL events for a specific time period? Ps> connect fxrhangeOnline userPrincipalName sysanalystatexanpteco.comA . The tmdlets to search the UAl were not Imported into the sessionB . The UAL cannot...
Which logs would be a preferable starting point for an investigation?
Sensitive company data is found leaked on the internet, and the security team didn't get any alert and is unsure of how the breach occurred. Which logs would be a preferable starting point for an investigation?A . Identity and Access ManagementB . ApplicationC . Resource ManagementD . EndpointView AnswerAnswer: A
What would prevent GCP 1AM from linking to Google Workspace to manage users and groups?
What would prevent GCP 1AM from linking to Google Workspace to manage users and groups?A . A gcp-organization-admins group was not createdB . The connector was not configured to link the servicesC . Inadequate Identity and Access Management licenseD . Google Workspace cannot be linked to GCP 1AMView AnswerAnswer: D
Based on the additional Information gathered below, what is most likely the cause of this configuration message?
An investigator is evaluating a client's Microsoft 365 deployment using the web portals and has identified that the Purview compliance portal states that the Unified Audit Logs are not enabled. Based on the additional Information gathered below, what is most likely the cause of this configuration message? Subscription creation date:...
What Pub/Sub component is used to forward GCP logs to their final location?
What Pub/Sub component is used to forward GCP logs to their final location?A . TopicB . Log SinkC . PublicationD . SubscriptionView AnswerAnswer: B
What does the first field starting with "385f9e" represent?
Below is an extract from a Server Access Log showing a record for a request made to an AWS S3 bucket. What does the first field starting with "385f9e" represent? A . Bucket OwnerB . Request IDC . Host IDD . Cipher SuiteView AnswerAnswer: B
What is a possible cause for this?
An investigator confirms that phishing emails sent to users in an organization ate not being sent to their Gmall Spam folder. What is a possible cause for this?A . The default setting for enhanced pre-delivery message scanning was changedB . The security sandbox default configuration setting was changedC . A...
Which EBS volume type would be appropriate to support a business critical SQL server hosted In AWS?
Which EBS volume type would be appropriate to support a business critical SQL server hosted In AWS?A . ST1B . GP3C . GP2D . I01View AnswerAnswer: D