Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 4 Question 32 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 32
Topic #: 4
[All GCFR Questions]

A cloud administrator needs to determine which user account allowed SSH Inbound from the internet on an Azure Network security group. Which type of log does the administrator need to examine?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Sheron
3 months ago
Maybe the administrator should just ask Siri. I'm sure she knows the answer and can also recommend a good log-reading playlist.
upvoted 0 times
...
Hermila
3 months ago
Ah, the classic 'which log do I need to check' question. I'm going with Resource log, but I'm secretly hoping it's the Tenant log just to see the administrator's reaction.
upvoted 0 times
Reena
1 months ago
I'm pretty sure it's the Tenant log.
upvoted 0 times
...
Loreta
1 months ago
I believe it's the Operating System log.
upvoted 0 times
...
Hannah
1 months ago
I would go with Subscription log.
upvoted 0 times
...
Francis
2 months ago
I think it's the Resource log.
upvoted 0 times
...
...
Ashley
3 months ago
Option D all the way! I bet the administrator is going to have a field day sifting through that log. Maybe they should invest in some popcorn while they're at it.
upvoted 0 times
Berry
2 months ago
A) Tenant
upvoted 0 times
...
Lenna
2 months ago
I agree, it's definitely going to be a challenge to find the right user account in that log.
upvoted 0 times
...
Alva
2 months ago
D) Resource
upvoted 0 times
...
...
Francene
3 months ago
I'm going with Option D. The Resource log sounds like the most likely place to find that kind of information.
upvoted 0 times
Nicolette
2 months ago
Yes, the Resource log is where we should look for that information. Let's go check it now.
upvoted 0 times
...
Margurite
2 months ago
I agree, let's check the Resource log to find out which user account allowed SSH Inbound from the internet.
upvoted 0 times
...
Na
2 months ago
I think Option D is the right choice too. The Resource log should have the details we need.
upvoted 0 times
...
...
Melita
4 months ago
Hmm, this is a tricky one. I'm thinking it's the Resource log since that's where the network security group details would be recorded.
upvoted 0 times
Ressie
2 months ago
I don't think it would be the Operating System log, that seems unrelated to network security group settings.
upvoted 0 times
...
Mayra
2 months ago
I'm not sure, but maybe it's worth checking the Subscription log as well just to be thorough.
upvoted 0 times
...
Alton
2 months ago
Yeah, I agree. The Resource log would definitely have the details we need to determine which user account allowed SSH Inbound.
upvoted 0 times
...
Peter
3 months ago
I think it might be the Resource log too, that's where all the network security group information is stored.
upvoted 0 times
...
...
Remedios
4 months ago
I'm not sure, but I think it could also be the Resource log that the administrator needs to look at.
upvoted 0 times
...
Daniela
4 months ago
I agree with Reuben, because the SSH Inbound from the internet would be related to the Subscription.
upvoted 0 times
...
Reuben
4 months ago
I think the administrator needs to examine the Subscription log.
upvoted 0 times
...

Save Cancel