New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCFR Exam - Topic 4 Question 32 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 32
Topic #: 4
[All GCFR Questions]

A cloud administrator needs to determine which user account allowed SSH Inbound from the internet on an Azure Network security group. Which type of log does the administrator need to examine?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Rossana
3 months ago
Wait, I thought it was the Operating System logs?
upvoted 0 times
...
Eden
3 months ago
Resource logs are the right choice, no doubt!
upvoted 0 times
...
Tomoko
3 months ago
Not so sure, could it be the Subscription logs instead?
upvoted 0 times
...
Rickie
4 months ago
I agree, Resource logs are the way to go!
upvoted 0 times
...
Lelia
4 months ago
Definitely need to check the Resource logs for that.
upvoted 0 times
...
Ammie
4 months ago
I’m leaning towards Tenant logs, but I’m confused about how they relate to user accounts and SSH access.
upvoted 0 times
...
Allene
4 months ago
I feel like the Operating System logs could be relevant, but they might not show the inbound rules specifically.
upvoted 0 times
...
Louvenia
4 months ago
I remember practicing a question about NSGs, and I think it was related to Subscription logs.
upvoted 0 times
...
Tiera
5 months ago
I think we might need to look at the Resource logs for this one, but I'm not entirely sure.
upvoted 0 times
...
Daron
5 months ago
This is a good question to test our understanding of Azure security and logging. I'm confident the answer is D. Resource, since that's where we would find information about the specific network security group configuration and access.
upvoted 0 times
...
Eve
5 months ago
Hmm, I'm a bit unsure about this one. I know Azure has different logging options, but I'm not sure which one would specifically track SSH inbound access from the internet. I'll have to review my notes on Azure networking.
upvoted 0 times
...
Elliot
5 months ago
This seems like a straightforward question about Azure network security. I'll need to think about the different types of logs that could contain information about SSH access.
upvoted 0 times
...
Theodora
5 months ago
Okay, I think I know the answer to this. The administrator would need to look at the Resource log to see which user account allowed the SSH inbound access. The Resource log tracks activity and changes at the resource level.
upvoted 0 times
...
Anissa
5 months ago
This seems like a tricky question. I'll try to break it down and see if I can logically work through the answer.
upvoted 0 times
...
Sheron
9 months ago
Maybe the administrator should just ask Siri. I'm sure she knows the answer and can also recommend a good log-reading playlist.
upvoted 0 times
...
Hermila
9 months ago
Ah, the classic 'which log do I need to check' question. I'm going with Resource log, but I'm secretly hoping it's the Tenant log just to see the administrator's reaction.
upvoted 0 times
Reena
8 months ago
I'm pretty sure it's the Tenant log.
upvoted 0 times
...
Loreta
8 months ago
I believe it's the Operating System log.
upvoted 0 times
...
Hannah
8 months ago
I would go with Subscription log.
upvoted 0 times
...
Francis
8 months ago
I think it's the Resource log.
upvoted 0 times
...
...
Ashley
10 months ago
Option D all the way! I bet the administrator is going to have a field day sifting through that log. Maybe they should invest in some popcorn while they're at it.
upvoted 0 times
Berry
8 months ago
A) Tenant
upvoted 0 times
...
Lenna
8 months ago
I agree, it's definitely going to be a challenge to find the right user account in that log.
upvoted 0 times
...
Alva
9 months ago
D) Resource
upvoted 0 times
...
...
Francene
10 months ago
I'm going with Option D. The Resource log sounds like the most likely place to find that kind of information.
upvoted 0 times
Nicolette
9 months ago
Yes, the Resource log is where we should look for that information. Let's go check it now.
upvoted 0 times
...
Margurite
9 months ago
I agree, let's check the Resource log to find out which user account allowed SSH Inbound from the internet.
upvoted 0 times
...
Na
9 months ago
I think Option D is the right choice too. The Resource log should have the details we need.
upvoted 0 times
...
...
Melita
10 months ago
Hmm, this is a tricky one. I'm thinking it's the Resource log since that's where the network security group details would be recorded.
upvoted 0 times
Ressie
8 months ago
I don't think it would be the Operating System log, that seems unrelated to network security group settings.
upvoted 0 times
...
Mayra
8 months ago
I'm not sure, but maybe it's worth checking the Subscription log as well just to be thorough.
upvoted 0 times
...
Alton
8 months ago
Yeah, I agree. The Resource log would definitely have the details we need to determine which user account allowed SSH Inbound.
upvoted 0 times
...
Peter
10 months ago
I think it might be the Resource log too, that's where all the network security group information is stored.
upvoted 0 times
...
...
Remedios
10 months ago
I'm not sure, but I think it could also be the Resource log that the administrator needs to look at.
upvoted 0 times
...
Daniela
10 months ago
I agree with Reuben, because the SSH Inbound from the internet would be related to the Subscription.
upvoted 0 times
...
Reuben
11 months ago
I think the administrator needs to examine the Subscription log.
upvoted 0 times
...

Save Cancel