giac GCFR Exam Questions

Questions for the GCFR were updated on : Nov 21 ,2025

Page 1 out of 6. Viewing questions 1-15 out of 82

Question 1

Which of the following operating systems are used by Blackberry 10 and found in some vehicles and
medical
devices?

  • A. Bada
  • B. POSIX
  • C. QNX
  • D. UNIX
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following actions described below would populate the suggestions table on an Android
phone?

  • A. Google Maps recommends locations, which are cached in the table
  • B. Google Maps tracks previously entered destinations by the user
  • C. The table contains previously saved or bookmarked destinations
Answer:

B

User Votes:
A
50%
B
50%
C
50%
Discussions
vote your answer:
A
B
C
0 / 1000

Question 3

Where are iOS Class keys stored?

  • A. In iCloud
  • B. Within the metadata of each file
  • C. Between the flash memory and the system area on the device
  • D. In effacable storage
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Using the SOF-ELK instance at 10.0.1.7:5601, inspect the netflow logs related to the ip 5.62.19.62.
Which of the ports seen in the netflow logs associated with the ip 5.62.19.62 has the lowest count?
Hint: Use a wide time frame such as 20 years to ensure all the relevant data is in the scope.

  • A. 2341
  • B. 389
  • C. 443
  • D. 49555
  • E. 80
  • F. 2222
  • G. 2374
  • H. 2208
  • I. 2263
  • J. 22
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
H
50%
I
50%
J
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
H
I
J
0 / 1000

Question 5

Access Kibana via http://10.0.1.7:5601 and use the *ws-* index pattern. Use the time range 2021-03-
01 00:00 UTC to 2021 04 U 00:00 UTC. How many ec2 DescribMnstantp*; events were performed by
the root user?

  • A. 374
  • B. 16
  • C. 6,695
  • D. 94
  • E. 0
  • F. 10
  • G. 2, 399
  • H. 248
  • I. 47
  • J. 229
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
H
50%
I
50%
J
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
H
I
J
0 / 1000

Question 6

Use Kibana to analyze the Azure AD sign-in logs in the azure-* index. On March 31st, 2021, what is
the timestamp of the earliest failed login attempt for the account dcr0ss5pymtechlabs.com?
ViewVM

  • A. 19:21:34
  • B. 18:11:07
  • C. 19:01:27
  • D. 01:04:24
  • E. 18:12:04
  • F. 19:02:06
  • G. 01:02:56
  • H. 19:02:12
  • I. 19:35:31
  • J. 18:11:45
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
H
50%
I
50%
J
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
H
I
J
0 / 1000

Question 7

Access Kibana via http://10.0.1.7:5601 and use the azure-* index pattern. Between March 31st, 2021
and April 3rd, 2021, how many virtual machines were created that use a Linux operating system?

  • A. 4
  • B. 6
  • C. 5
  • D. 2
  • E. 3
  • F. 8
  • G. 7
  • H. 9
  • I. 1
  • J. 10
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
H
50%
I
50%
J
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
H
I
J
0 / 1000

Question 8

An engineer is troubleshooting a complaint that a web server in AWS cannot receive incoming traffic,
but the server can connect to the internet otherwise. What is needed to solve this problem?

  • A. VPC Subnet
  • B. NAT Gateway
  • C. Network Security Group
  • D. Internet Gateway
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack
technique falls under which category of the Google Workspace MITRE ATT&CK matrix?

  • A. Defense evasion
  • B. Discovery
  • C. Credential access
  • D. Collection
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What approach can be used to enable Mac instances on AWS?

  • A. Emulating the M1 processor using ARM clusters
  • B. Installing OS X exclusively on I (Burstable) instance
  • C. Using physical Mac computers in the data center
  • D. Virtualizing OS X on Unix servers
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following Windows agents would need to be configured on an Azure VM for an
investigator to query Its operating system logs sent to Azure Storage?

  • A. Azure Monitor
  • B. Diagnostic Extension
  • C. Dependency
  • D. Log Analytics
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

A client was responsible for their environment's OS, then they delegated this responsibility to their
cloud provider. Which of the following migrations could describe this scenario?

  • A. On-prern to UdS
  • B. SaaStoOn-prem
  • C. IaaS to PaaS
  • D. PaaS to SaaS
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

A system administration team has deployed several laaS platform servers and intend to host a
custom application in the cloud. Which of the following is the responsibility of the system
administration team with this architecture?

  • A. Transferring the private key* for encrypting application data to the cloud provider
  • B. Creating a redundant data center to provide global backups
  • C. Fixing software vulnerabilities in the code on the perimeter firewall
  • D. System security patches and updates for the application servers
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which is a limitation of AWS Lambdas?

  • A. Functions must run in less than 15 minutes
  • B. They can be quite costly to operate
  • C. Managing systems can be time consuming
  • D. They only support up to 256 MB of storage
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

A company is creating an incident response team that will be part of their existing GCP Organization.
Where in the organizational structure should their services be placed?

  • A. With the Resources
  • B. As part of d Project
  • C. ln a dedicated Folder
  • D. At the root Organization
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2