
FORGC2
Authored by shyrlyn valdez
Other
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which WAD table contains the Windows event logs?
WADWindowsEventLogsTable
WADDiagnosticInfrastructureLogsTable
WADPerformaceCountersTable
WADMetricsPT1MPDV2S########
Answer explanation
WADWindowsEventLogsTable is the most interesting table for incident response and forensics, as it contains the Windows event logs. This is a great opportunity to obtain operating system logs without the need to log in the virtual machine itself.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When are network security groups created in Azure?
Automatically, with every VM unless an existing one is specified
Automatically, every night at 3 a.m. ET
Automatically, with every VM
Manually, before the creation of a new VM
Answer explanation
Azure automatically creates a network security group (NSG) when you create a virtual machine: <name of machine>-nsg, unless an existing one is specified. After creating NSG rules, flow logs can be created. Flow logs are the source of truth for all network activity in your cloud environment and are a "must have" for any investigation.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Azure, what is the name of an object that represents an entity which can access a resource?
Security principal
Binding
Organizational resource
ARN
Answer explanation
Azure role-based access control (RBAC) lets you manage who has access to what resource and what they can do with that resource. Azure RBAC is an authorization system built on Azure Resource Manager. To control access to resources, you create role assignments. There are three elements to a role assignment:
1. Security principal – An object representing an entity such as a user or group, which can access the resource
2. Role definition – A collection of permissions such as read, write, and delete
3. Scope – Specifies which role can access a resource or resource group; scopes can be specified at four levels: management group, subscription, resource group, resource
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where would an engineer configure logs to be sent to a Log Analytics workspace within the Azure Active Directory service for correlation?
Audit logs
Sign-ins
Diagnostic settings
Provisioning logs
Answer explanation
While the portal is convenient for a quick search, it is very limited. The real power is in the Log Analytics workspace. The best solution is to send most relevant log types, including Azure Active Directory (AAD) logs, to the Log Analytics workspace. This provides a single location to see all your logs, which is very convenient.
For the AAD logs, you will need to complete the following steps in the Azure portal:
• Step 1: Search for and select the "Azure Active Directory" service
• Step 2: On the left menu, select "Diagnostic settings"
• Step 3: Select "Add diagnostic setting"
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When investigating brute-force attempts in SOF-ELK, which sign-in log field should you check for the Azure Active Directory name of the user?
useragent
user_name
user_principal_name
user_id
Answer explanation
The user_principal_name field includes the Azure Active Directory (AAD) name of the login user, which is critical to include in detection methods but also useful for identifying the account used for specific actions.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of storage should you pick to store a snapshot of an Azure VM?
The fastest SSD
The fastest HDD
A standard HDD
A standard SSD
Answer explanation
When creating a snapshot, you can pick the cheapest standard HDD storage option. There is no need for a premium SSD because you will not be running forensic tools against the snapshot directly.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which operation should be reviewed in the StorageRead log while investigating a suspected data exfiltration incident?
CopyResource
GetBlob
StorageWrite
StorageDelete
Answer explanation
There are a large number of actions tracked in the operationName field in the StorageRead log, but for the purpose of tracking data exfiltration, you should focus on the GetBlob operation.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
32 questions
C# Skill Review
Quiz
•
12th Grade - Professi...
41 questions
remi diii AIJ XI Genap 2025
Quiz
•
Professional Development
35 questions
Telephone Communication in Healthcare Facilities
Quiz
•
Professional Development
34 questions
AZ-900 - Módulo 04 - Segurança
Quiz
•
Professional Development
35 questions
Kuis Mental Health dan CodeIgniter
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...