GCFA Practice Questions: Enterprise Environment Incident Response Domain
Test your GCFA knowledge with 10 practice questions from the Enterprise Environment Incident Response domain. Includes detailed explanations and answers.
GCFA Practice Questions
Master the Enterprise Environment Incident Response Domain
Test your knowledge in the Enterprise Environment Incident Response domain with these 10 practice questions. Each question is designed to help you prepare for the GCFA certification exam with detailed explanations to reinforce your learning.
Question 1
You need to prioritize containment actions after detecting a suspicious process. Which artifact is most critical to examine first?
Show Answer & Explanation
Correct Answer: C
Explanation: Examining a memory dump is critical for understanding the current state of a suspicious process, including its network connections and loaded modules, which is essential for immediate containment.
Question 2
In a volatile memory analysis, you find multiple instances of svchost.exe with unusual network connections. What should be your primary focus?
Show Answer & Explanation
Correct Answer: C
Explanation: Identifying services linked to svchost.exe instances helps determine if any are malicious. Parent processes and command line arguments provide context, but service linkage is key for svchost.exe.
Question 3
Given the following Windows Event Log snippet, what is the most likely activity indicated? Event ID: 4624 Logon Type: 10 Subject: Security ID: S-1-5-18 Account Name: SYSTEM A remote logon was performed. What should be prioritized for investigation?
Show Answer & Explanation
Correct Answer: A
Explanation: Event ID 4624 with Logon Type 10 indicates a remote interactive logon, typically via RDP. Therefore, checking for unauthorized RDP access should be prioritized. Local console logons would have a different logon type, and scheduled tasks or software installations are not directly related to this logon type.
Question 4
An analyst correlates multiple artifacts and suspects data exfiltration. Which artifact should be prioritized to confirm this activity?
Show Answer & Explanation
Correct Answer: C
Explanation: Network traffic logs can reveal data exfiltration by showing unusual outbound connections or data transfers.
Question 5
During an incident response, you find an entry in the MFT with a recent timestamp but no corresponding file in the directory. What might this suggest?
Show Answer & Explanation
Correct Answer: A
Explanation: A recent MFT entry with no corresponding file typically indicates the file was deleted, possibly securely to prevent recovery.
Question 6
You are tasked with determining if a system was compromised via a phishing attack. Which artifact would provide the most direct evidence?
Show Answer & Explanation
Correct Answer: A
Explanation: Email server logs can show if a phishing email was received and opened. Windows Event Logs and AmCache entries provide system activity but not specific email evidence. Browser history can help, but email logs are more direct for phishing.
Question 7
While analyzing a compromised system, you find an entry in the USN journal indicating a file modification. What is the primary purpose of the USN journal?
Show Answer & Explanation
Correct Answer: B
Explanation: The USN journal is a feature of NTFS that tracks changes to files and directories on a volume. This helps in understanding what modifications have been made, which is crucial during forensic investigations. Options A, C, and D do not describe the purpose of the USN journal.
Question 8
During an incident response, you identify a suspicious process running on a server. Which artifact would best help determine if this process was executed from a malicious executable?
Show Answer & Explanation
Correct Answer: C
Explanation: Prefetch files can indicate if an executable was run and provide the first run time. Event ID 4688 logs process creation but not the first execution time. ShimCache records execution history but not timestamps. The USN Journal tracks file changes, not execution.
Question 9
During a Linux incident response, you discover a process has been started via systemd. Which log file would contain the most detailed execution information?
Show Answer & Explanation
Correct Answer: C
Explanation: The systemd journal (accessed via journalctl) contains detailed service startup information including command arguments, environment variables, and execution status. Traditional syslog may miss systemd-specific details.
Question 10
During an incident response, you find the following Prefetch file: 'WINWORD.EXE-3A4B2C3D.pf'. What is the primary purpose of examining this artifact?
Show Answer & Explanation
Correct Answer: B
Explanation: Prefetch files are used to speed up the loading of applications by storing metadata about the application's execution. They can provide information on execution frequency and last execution time, but not the first execution time, user identity, or digital signature verification.
Ready to Accelerate Your GCFA Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all GCFA domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About GCFA Certification
The GCFA certification validates your expertise in enterprise environment incident response and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
Keep Practicing: GCFA Topic-Focused Question Sets
Sharpen your incident response & forensics skills with these targeted FlashGenius practice pages:
- Identification of Normal System/User Activity
- Identification of Malicious System/User Activity
- File System Timeline Artifact Analysis
- Analyzing Volatile Windows/Event Artifacts
- Introduction to File System Timeline Forensics
- Introduction to Memory Forensics
- Windows Artifact Analysis
- NTFS Artifact Analysis
- Enterprise Environment Incident Response
Need a Complete GCFA Roadmap?
Go beyond practice questions — explore the Ultimate GCFA Certification Guide covering exam domains, eligibility, costs, study plan, and preparation strategy.
📘 Read the Ultimate GCFA Guide →