Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 9 Question 46 Discussion

Actual exam question for GIAC's GCED exam
Question #: 46
Topic #: 9
[All GCED Questions]

The creation of a filesystem timeline is associated with which objective?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Jess
5 months ago
I think it's definitely not related to access control, so I would rule out option C.
upvoted 0 times
...
Shaniqua
6 months ago
I believe it could also be useful for incident eradication, to track the timeline of events leading up to the incident.
upvoted 0 times
...
Celestine
6 months ago
Forensic analysis, hands down. The filesystem timeline is where the real digital detectives work their magic.
upvoted 0 times
Leota
5 months ago
Definitely forensic analysis, that's where the real investigation happens.
upvoted 0 times
...
Jacquelyne
5 months ago
Forensic analysis
upvoted 0 times
...
...
Maurine
6 months ago
I agree with Kami, it helps in reconstructing events for forensic analysis.
upvoted 0 times
...
Donte
6 months ago
Forensic analysis, baby! Where else are we gonna find the juicy details, like who's been downloading cat videos on the job?
upvoted 0 times
Desiree
5 months ago
C) Access control
upvoted 0 times
...
Dyan
6 months ago
B) First response
upvoted 0 times
...
Ricki
6 months ago
A) Forensic analysis
upvoted 0 times
...
...
Aimee
6 months ago
Incident eradication, easy peasy. Just gotta find the culprit and delete them from existence. Problem solved!
upvoted 0 times
...
Delmy
6 months ago
Access control? Pffft, that's for the IT crowd. Real hackers go straight for the filesystem timeline!
upvoted 0 times
Louvenia
5 months ago
D) Incident eradication
upvoted 0 times
...
Ira
5 months ago
C) Access control
upvoted 0 times
...
Omer
5 months ago
B) First response
upvoted 0 times
...
Diane
5 months ago
A) Forensic analysis
upvoted 0 times
...
...
Marci
6 months ago
First response, no doubt. Gotta be ready to track those virtual footprints before they get swept away.
upvoted 0 times
Linette
6 months ago
B) First response
upvoted 0 times
...
Krissy
6 months ago
A) Forensic analysis
upvoted 0 times
...
...
Isadora
7 months ago
Forensic analysis, of course! I can practically smell the digital breadcrumbs waiting to be uncovered.
upvoted 0 times
Alverta
6 months ago
D) Incident eradication
upvoted 0 times
...
Shawna
6 months ago
I agree, the filesystem timeline is crucial for forensic analysis.
upvoted 0 times
...
Maxima
6 months ago
A) Forensic analysis
upvoted 0 times
...
...
Kami
7 months ago
I think the creation of a filesystem timeline is associated with forensic analysis.
upvoted 0 times
...

Save Cancel