Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFR Exam Dumps - GIAC Cyber Security Questions and Answers

Question # 14

An analyst successfully authenticated to Microsoft 365 using the following command. What would cause the analyst to be unable to search UAL events for a specific time period?

Ps> connect fxrhangeOnline userPrincipalName sysanalystatexanpteco.com

Options:

A.

The tmdlets to search the UAl were not Imported into the session

B.

The UAL cannot be searched when using Microsoft 365 PowerShell

C.

The incorrect version of the FxhangeOnlineManagement module was installed

D.

The ExchangeOnlineManagement module was not installed

Buy Now
Question # 15

Which Azure blob storage option is typically used to store virtual hard drive (VHD) Ales?

Options:

A.

page

B.

Append

C.

File

D.

Block

Buy Now
Question # 16

Which is the effective access when aws user is assigned to an S3 bucket?

Options:

A.

A user must have an employee account

B.

A user must have an account under any AWS account

C.

A user must be under the same AWS account as the S3 bucket

D.

A user must have the AWS IAM role assigned

Buy Now
Question # 17

What is the maximum file size for Azure Page Blob storage?

Options:

A.

10.25 TB

B.

10.25 TB

C.

8TB

D.

7TB

Buy Now
Question # 18

What approach can be used to enable Mac instances on AWS?

Options:

A.

Emulating the M1 processor using ARM clusters

B.

Installing OS X exclusively on I (Burstable) instance

C.

Using physical Mac computers in the data center

D.

Virtualizing OS X on Unix servers

Buy Now
Question # 19

Which of the following actions described below would populate the suggestions table on an Android phone?

Options:

A.

Google Maps recommends locations, which are cached in the table

B.

Google Maps tracks previously entered destinations by the user

C.

The table contains previously saved or bookmarked destinations

Buy Now
Question # 20

AWS VPC Flow logs are enabled. What do these logs capture?

Options:

A.

TCP Checksums

B.

Packet Metadata

C.

TLS Handshakes

D.

Payload Bytes

Buy Now
Question # 21

What method does Google use to alert Gmail account holders that they may be under attack by government sponsored attackers?

Options:

A.

Message upon successful logon

B.

SMS text message

C.

Email sent to the user

D.

Alert sent to recovery account

Buy Now
Question # 22

Using the SOF-ELK instance at 10.0.1.7:5601, inspect the netflow logs related to the ip 5.62.19.62.

Which of the ports seen in the netflow logs associated with the ip 5.62.19.62 has the lowest count?

Hint: Use a wide time frame such as 20 years to ensure all the relevant data is in the scope.

Options:

A.

2341

B.

389

C.

443

D.

49555

E.

80

F.

2222

G.

2374

Buy Now
Question # 23

What is a best practice recommendation when using API keys for AWS access?

Options:

A.

Delete the account's default access keys

B.

Define specific role permissions

C.

Enable MFA protection

D.

Configure STS one-time tokens

Buy Now
Exam Code: GCFR
Exam Name: GIAC Cloud Forensics Responder (GCFR)
Last Update: Aug 24, 2025
Questions: 82
GCFR pdf

GCFR PDF

$25.5  $84.99
GCFR Engine

GCFR Testing Engine

$28.5  $94.99
GCFR PDF + Engine

GCFR PDF + Testing Engine

$40.5  $134.99