Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Cyber Security GCFR Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFR Premium Access

View all detail and faqs for the GCFR exam


426 Students Passed

86% Average Score

94% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the maximum file size for Azure Page Blob storage?

Options:

A.

10.25 TB

B.

10.25 TB

C.

8TB

D.

7TB

Questions # 2:

In Azure, which of the following describes a "Contributor"?

Options:

A.

A collection of permissions such as read, write, and delete

B.

A designation on a PKI certificate

C.

A specification of who can access a resource group

D.

An object representing an entity

Questions # 3:

Which Azure binary large object type is usually used to store virtual hard drive files?

Options:

A.

Append

B.

Page

C.

Block

Questions # 4:

Which AWS authentication method provides temporary, limited privilege credentials for 1AM users or federated users?

Options:

A.

lAMRole

B.

API Key

C.

SAML Token

Questions # 5:

What is shown in the screenshot?

Question # 5

Options:

A.

Google threat types

B.

Windows event channels

C.

Mitre ATT&CK tactics

D.

CIS critical controls

Questions # 6:

Which is a limitation of AWS Lambdas?

Options:

A.

Functions must run in less than 15 minutes

B.

They can be quite costly to operate

C.

Managing systems can be time consuming

D.

They only support up to 256 MB of storage

Questions # 7:

Which is the effective access when aws user is assigned to an S3 bucket?

Options:

A.

A user must have an employee account

B.

A user must have an account under any AWS account

C.

A user must be under the same AWS account as the S3 bucket

D.

A user must have the AWS IAM role assigned

Questions # 8:

A company using PaaS to host and develop their software application is experiencing a DOS attack. What challenge will a DFIR analyst experience when investigating this attack?

Options:

A.

Restricted access to their application logs

B.

Resource scaling will affect access to logs

C.

Network logs are unavailable for review

D.

Network monitoring disabled by the company

Questions # 9:

In which scenario would an investigator collect NetFlow logs rather than PCAP logs?

Options:

A.

To save on storage space

B.

For detailed network monitoring

C.

For deep packet inspection

D.

To collect application layer data

Questions # 10:

What unique identifier is used by AWS to identify a specific account and allow integration with external organizations?

Options:

A.

Public Key

B.

Token

C.

ARN

D.

SID

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.