Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 4 Question 32 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 32
Topic #: 4
[All GCFR Questions]

A cloud administrator needs to determine which user account allowed SSH Inbound from the internet on an Azure Network security group. Which type of log does the administrator need to examine?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Sheron
30 days ago
Maybe the administrator should just ask Siri. I'm sure she knows the answer and can also recommend a good log-reading playlist.
upvoted 0 times
...
Hermila
1 months ago
Ah, the classic 'which log do I need to check' question. I'm going with Resource log, but I'm secretly hoping it's the Tenant log just to see the administrator's reaction.
upvoted 0 times
...
Ashley
1 months ago
Option D all the way! I bet the administrator is going to have a field day sifting through that log. Maybe they should invest in some popcorn while they're at it.
upvoted 0 times
Alva
18 days ago
D) Resource
upvoted 0 times
...
...
Francene
1 months ago
I'm going with Option D. The Resource log sounds like the most likely place to find that kind of information.
upvoted 0 times
Nicolette
14 days ago
Yes, the Resource log is where we should look for that information. Let's go check it now.
upvoted 0 times
...
Margurite
15 days ago
I agree, let's check the Resource log to find out which user account allowed SSH Inbound from the internet.
upvoted 0 times
...
Na
19 days ago
I think Option D is the right choice too. The Resource log should have the details we need.
upvoted 0 times
...
...
Melita
2 months ago
Hmm, this is a tricky one. I'm thinking it's the Resource log since that's where the network security group details would be recorded.
upvoted 0 times
Ressie
3 days ago
I don't think it would be the Operating System log, that seems unrelated to network security group settings.
upvoted 0 times
...
Mayra
4 days ago
I'm not sure, but maybe it's worth checking the Subscription log as well just to be thorough.
upvoted 0 times
...
Alton
5 days ago
Yeah, I agree. The Resource log would definitely have the details we need to determine which user account allowed SSH Inbound.
upvoted 0 times
...
Peter
1 months ago
I think it might be the Resource log too, that's where all the network security group information is stored.
upvoted 0 times
...
...
Remedios
2 months ago
I'm not sure, but I think it could also be the Resource log that the administrator needs to look at.
upvoted 0 times
...
Daniela
2 months ago
I agree with Reuben, because the SSH Inbound from the internet would be related to the Subscription.
upvoted 0 times
...
Reuben
3 months ago
I think the administrator needs to examine the Subscription log.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77