Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 4 Question 32 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 32
Topic #: 4
[All GCFR Questions]

A cloud administrator needs to determine which user account allowed SSH Inbound from the internet on an Azure Network security group. Which type of log does the administrator need to examine?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Sheron
1 months ago
Maybe the administrator should just ask Siri. I'm sure she knows the answer and can also recommend a good log-reading playlist.
upvoted 0 times
...
Hermila
1 months ago
Ah, the classic 'which log do I need to check' question. I'm going with Resource log, but I'm secretly hoping it's the Tenant log just to see the administrator's reaction.
upvoted 0 times
...
Ashley
1 months ago
Option D all the way! I bet the administrator is going to have a field day sifting through that log. Maybe they should invest in some popcorn while they're at it.
upvoted 0 times
Lenna
2 days ago
I agree, it's definitely going to be a challenge to find the right user account in that log.
upvoted 0 times
...
Alva
20 days ago
D) Resource
upvoted 0 times
...
...
Francene
1 months ago
I'm going with Option D. The Resource log sounds like the most likely place to find that kind of information.
upvoted 0 times
Nicolette
16 days ago
Yes, the Resource log is where we should look for that information. Let's go check it now.
upvoted 0 times
...
Margurite
17 days ago
I agree, let's check the Resource log to find out which user account allowed SSH Inbound from the internet.
upvoted 0 times
...
Na
21 days ago
I think Option D is the right choice too. The Resource log should have the details we need.
upvoted 0 times
...
...
Melita
2 months ago
Hmm, this is a tricky one. I'm thinking it's the Resource log since that's where the network security group details would be recorded.
upvoted 0 times
Ressie
5 days ago
I don't think it would be the Operating System log, that seems unrelated to network security group settings.
upvoted 0 times
...
Mayra
6 days ago
I'm not sure, but maybe it's worth checking the Subscription log as well just to be thorough.
upvoted 0 times
...
Alton
7 days ago
Yeah, I agree. The Resource log would definitely have the details we need to determine which user account allowed SSH Inbound.
upvoted 0 times
...
Peter
2 months ago
I think it might be the Resource log too, that's where all the network security group information is stored.
upvoted 0 times
...
...
Remedios
2 months ago
I'm not sure, but I think it could also be the Resource log that the administrator needs to look at.
upvoted 0 times
...
Daniela
2 months ago
I agree with Reuben, because the SSH Inbound from the internet would be related to the Subscription.
upvoted 0 times
...
Reuben
3 months ago
I think the administrator needs to examine the Subscription log.
upvoted 0 times
...

Save Cancel