Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 1 Question 16 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 16
Topic #: 1
[All GCFR Questions]

A company using PaaS to host and develop their software application is experiencing a DOS attack. What challenge will a DFIR analyst experience when investigating this attack?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Julian
3 months ago
Hmm, network monitoring disabled? That's like trying to catch a ghost without a ghost trap. Good luck to the DFIR team, they're gonna need it!
upvoted 0 times
Theron
2 months ago
D: Network monitoring disabled by the company
upvoted 0 times
...
Paulene
2 months ago
C: Network logs are unavailable for review
upvoted 0 times
...
Mari
2 months ago
B: Resource scaling will affect access to logs
upvoted 0 times
...
Aja
2 months ago
A: Restricted access to their application logs
upvoted 0 times
...
...
Vincent
3 months ago
No network logs? That's like a detective trying to solve a crime with no crime scene. This is going to be a real headache.
upvoted 0 times
Jacki
2 months ago
C) Network logs are unavailable for review
upvoted 0 times
...
Blair
2 months ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Queenie
2 months ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Iluminada
3 months ago
Ah, I see the challenge here. With resource scaling, the logs could be all over the place. Good luck to that DFIR analyst!
upvoted 0 times
Sherita
2 months ago
C: Network logs are unavailable for review
upvoted 0 times
...
Chantay
2 months ago
B: Resource scaling will affect access to logs
upvoted 0 times
...
Arlyne
2 months ago
A: Restricted access to their application logs
upvoted 0 times
...
...
Jettie
3 months ago
Restricted access to application logs? Yikes, that's going to make it really difficult to investigate the attack. Guess they'll have to get creative.
upvoted 0 times
Alexis
2 months ago
C) Network logs are unavailable for review
upvoted 0 times
...
Evelynn
2 months ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Ula
2 months ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Krissy
4 months ago
Wow, this is a tricky one! If the company is using PaaS, I bet the DFIR analyst is going to have a hard time getting their hands on those logs.
upvoted 0 times
Daniel
3 months ago
C) Network logs are unavailable for review
upvoted 0 times
...
Kandis
3 months ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Noemi
3 months ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Jesusita
4 months ago
I agree. Without access to the logs, it will be difficult to trace the source of the attack.
upvoted 0 times
...
Nan
4 months ago
Yeah, that could definitely make it harder to investigate the attack.
upvoted 0 times
...
Gerald
4 months ago
I think the challenge will be restricted access to their application logs.
upvoted 0 times
...

Save Cancel