Try 12 GIAC Cloud Security Essentials (GCLD) sample questions and practice-test preview prompts on shared responsibility, cloud identity, storage exposure, logging, encryption, workload isolation, and incident response.
GIAC Cloud Security Essentials (GCLD) is a cloud-security route for candidates who need practical judgment around shared responsibility, identity, logging, encryption, storage exposure, workload controls, and cloud incident response.
Use this page to preview the kind of cloud-security decisions a GCLD practice route should test. The questions below are original IT Mastery sample questions, not official GIAC exam questions.
Topic: shared responsibility
A company moves a database to a managed cloud service. Which statement best reflects shared responsibility?
Best answer: B
Explanation: Managed services shift some operational duties to the provider, but customers still make critical configuration, identity, data, and monitoring decisions.
Topic: cloud identity
A workload needs to read one storage bucket. What access pattern is best?
Best answer: A
Explanation: Cloud workloads should use scoped identities and least privilege. Long-lived admin secrets in code create high exposure.
Topic: storage exposure
A storage bucket containing internal reports is accidentally public. What should be done first?
Best answer: D
Explanation: Public storage exposure requires containment, evidence review, impact assessment, and preventive control improvement.
Topic: logging
An attacker may have used stolen cloud credentials. Which logs are most relevant?
Best answer: B
Explanation: Credential misuse in cloud environments often appears in API, control-plane, identity, and resource-change evidence.
Topic: encryption
Which statement about cloud encryption is most accurate?
Best answer: B
Explanation: Encryption is one layer. Key access, policy, monitoring, classification, and operational controls determine whether encryption reduces risk.
Topic: workload isolation
A development workload and production workload share the same broad administrator role. What is the main risk?
Best answer: A
Explanation: Separating environments and privileges limits blast radius. Shared broad roles weaken isolation.
Topic: incident response
Cloud incident response differs from on-premises response because responders often need to rely on what?
Best answer: D
Explanation: Cloud response uses cloud-native evidence and controls. Responders need logs, snapshots, identity context, and platform-specific procedures.
Topic: posture management
A security team wants to detect public storage, overly broad roles, and missing logging across accounts. Which capability fits best?
Best answer: C
Explanation: Posture monitoring can continuously detect misconfigurations across cloud environments. Manual snapshots alone miss drift.
Topic: serverless permissions
A serverless function needs to write one queue but currently has broad account access. What is the best correction?
Best answer: A
Explanation: Serverless functions still need least-privilege identities. Execution roles should match the required actions and resources.
Topic: container security
An image used in production contains critical known vulnerabilities and hardcoded secrets. What should happen before redeployment?
Best answer: A
Explanation: Container issues can persist across deployments. Secrets must be removed and rotated, and vulnerable dependencies should be fixed.
Topic: network controls
A database should be reachable only from an application tier. Which cloud control pattern is most appropriate?
Best answer: C
Explanation: Cloud network controls should restrict expected paths and be paired with identity and monitoring. Private placement alone is not enough.
Topic: data residency
A regulated data set must stay in approved regions. Which control set best supports that requirement?
Best answer: A
Explanation: Data residency depends on guardrails, monitoring, and review of replication, backup, and deployment behavior.
| If you miss… | Drill this next |
|---|---|
| shared-responsibility questions | provider-managed versus customer-controlled duties |
| identity questions | scoped roles, service identities, MFA, and logging |
| storage and data questions | public access, encryption, key management, and residency |
| incident questions | cloud-native logs, snapshots, isolation, and control-plane evidence |