100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

GIAC CLOUD THREAT DETECTION (GCTD) PRACTICE EXAM LATEST QUESTIONS AND CORRECT ANSWERS GRADE A

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
18-01-2026
Written in
2025/2026

GIAC CLOUD THREAT DETECTION (GCTD) PRACTICE EXAM LATEST QUESTIONS AND CORRECT ANSWERS GRADE A

Institution
Engineering Technology
Course
Engineering technology











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Engineering technology
Course
Engineering technology

Document information

Uploaded on
January 18, 2026
Number of pages
46
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • gctd practice exam

Content preview

GIAC CLOUD THREAT DETECTION (GCTD) PRACTICE EXAM LATEST QUESTIONS AND
CORRECT ANSWERS GRADE A

=================================================

Total Questions: 100

Question Types: Multiple Choice (A-D)

Format: Question + Answer Key + Explanation



--------------------------------------------------

QUESTION 1

What is the primary purpose of AWS CloudTrail?

A) Monitor network traffic

B) Log API activity across AWS services

C) Detect malware in EC2 instances

D) Manage IAM policies



ANSWER: B) Log API activity across AWS services

EXPLANATION: AWS CloudTrail is a service that enables governance, compliance,
operational auditing, and risk auditing of your AWS account through logging API calls and
account activity.



--------------------------------------------------

QUESTION 2

Which Azure service provides centralized security policy management and threat detection
across hybrid cloud workloads?

A) Azure Security Center

B) Azure Sentinel

C) Azure Monitor

,D) Azure Policy



ANSWER: A) Azure Security Center

EXPLANATION: Azure Security Center provides unified security management and advanced
threat protection across hybrid cloud workloads, including security policy management
and threat detection capabilities.



--------------------------------------------------

QUESTION 3

What type of attack involves an adversary attempting to enumerate valid IAM users in a
cloud environment?

A) Credential stuffing

B) IAM user enumeration

C) Role assumption attack

D) Token hijacking



ANSWER: B) IAM user enumeration

EXPLANATION: IAM user enumeration is a reconnaissance technique where attackers
attempt to discover valid IAM user names through error messages or API responses.



--------------------------------------------------

QUESTION 4

In GCP, which service provides security and compliance health checks and threat
detection?

A) Cloud Security Command Center

B) Cloud Monitoring

C) Cloud Logging

,D) Cloud Armor



ANSWER: A) Cloud Security Command Center

EXPLANATION: Google Cloud Security Command Center provides security and risk
management platform that helps with security health analytics, vulnerability scanning, and
threat detection.



--------------------------------------------------

QUESTION 5

What is the primary risk associated with public S3 buckets?

A) Increased storage costs

B) Data exfiltration

C) DDoS attacks

D) Malware injection



ANSWER: B) Data exfiltration

EXPLANATION: Public S3 buckets can lead to data exfiltration if sensitive data is stored
without proper access controls, potentially exposing confidential information.



--------------------------------------------------

QUESTION 6

Which AWS service can detect unusual API activity that might indicate a compromised
account?

A) AWS GuardDuty

B) AWS Config

C) AWS Inspector

D) AWS Shield

, ANSWER: A) AWS GuardDuty

EXPLANATION: AWS GuardDuty is a threat detection service that continuously monitors for
malicious activity and unauthorized behavior using machine learning and threat
intelligence.



--------------------------------------------------

QUESTION 7

What is "shadow IT" in cloud security context?

A) Unauthorized cloud services usage

B) Dark web monitoring

C) Backup infrastructure

D) Penetration testing



ANSWER: A) Unauthorized cloud services usage

EXPLANATION: Shadow IT refers to IT systems and solutions built and used inside
organizations without explicit organizational approval, often using cloud services without
security oversight.



--------------------------------------------------

QUESTION 8

Which Azure service is a SIEM solution for cloud environments?

A) Azure Sentinel

B) Azure Defender

C) Azure Log Analytics

D) Azure Event Hubs

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUANKADA Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
315
Member since
4 year
Number of followers
249
Documents
3878
Last sold
2 weeks ago
Professionalacademictutor

On this page, you find all documents, package deals, and flashcards offered by seller

3.8

43 reviews

5
25
4
4
3
2
2
6
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions