Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 1 Question 16 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 16
Topic #: 1
[All GCFR Questions]

A company using PaaS to host and develop their software application is experiencing a DOS attack. What challenge will a DFIR analyst experience when investigating this attack?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Julian
1 months ago
Hmm, network monitoring disabled? That's like trying to catch a ghost without a ghost trap. Good luck to the DFIR team, they're gonna need it!
upvoted 0 times
Theron
1 days ago
D: Network monitoring disabled by the company
upvoted 0 times
...
Paulene
3 days ago
C: Network logs are unavailable for review
upvoted 0 times
...
Mari
5 days ago
B: Resource scaling will affect access to logs
upvoted 0 times
...
Aja
17 days ago
A: Restricted access to their application logs
upvoted 0 times
...
...
Vincent
1 months ago
No network logs? That's like a detective trying to solve a crime with no crime scene. This is going to be a real headache.
upvoted 0 times
Jacki
4 days ago
C) Network logs are unavailable for review
upvoted 0 times
...
Blair
7 days ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Queenie
12 days ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Iluminada
1 months ago
Ah, I see the challenge here. With resource scaling, the logs could be all over the place. Good luck to that DFIR analyst!
upvoted 0 times
Sherita
16 days ago
C: Network logs are unavailable for review
upvoted 0 times
...
Chantay
17 days ago
B: Resource scaling will affect access to logs
upvoted 0 times
...
Arlyne
19 days ago
A: Restricted access to their application logs
upvoted 0 times
...
...
Jettie
2 months ago
Restricted access to application logs? Yikes, that's going to make it really difficult to investigate the attack. Guess they'll have to get creative.
upvoted 0 times
Alexis
8 days ago
C) Network logs are unavailable for review
upvoted 0 times
...
Evelynn
9 days ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Ula
16 days ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Krissy
2 months ago
Wow, this is a tricky one! If the company is using PaaS, I bet the DFIR analyst is going to have a hard time getting their hands on those logs.
upvoted 0 times
Daniel
1 months ago
C) Network logs are unavailable for review
upvoted 0 times
...
Kandis
2 months ago
B) Resource scaling will affect access to logs
upvoted 0 times
...
Noemi
2 months ago
A) Restricted access to their application logs
upvoted 0 times
...
...
Jesusita
2 months ago
I agree. Without access to the logs, it will be difficult to trace the source of the attack.
upvoted 0 times
...
Nan
2 months ago
Yeah, that could definitely make it harder to investigate the attack.
upvoted 0 times
...
Gerald
2 months ago
I think the challenge will be restricted access to their application logs.
upvoted 0 times
...

Save Cancel