Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 9 Question 46 Discussion

Actual exam question for GIAC's GCED exam
Question #: 46
Topic #: 9
[All GCED Questions]

The creation of a filesystem timeline is associated with which objective?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Jess
3 months ago
I think it's definitely not related to access control, so I would rule out option C.
upvoted 0 times
...
Shaniqua
3 months ago
I believe it could also be useful for incident eradication, to track the timeline of events leading up to the incident.
upvoted 0 times
...
Celestine
3 months ago
Forensic analysis, hands down. The filesystem timeline is where the real digital detectives work their magic.
upvoted 0 times
Leota
3 months ago
Definitely forensic analysis, that's where the real investigation happens.
upvoted 0 times
...
Jacquelyne
3 months ago
Forensic analysis
upvoted 0 times
...
...
Maurine
3 months ago
I agree with Kami, it helps in reconstructing events for forensic analysis.
upvoted 0 times
...
Donte
4 months ago
Forensic analysis, baby! Where else are we gonna find the juicy details, like who's been downloading cat videos on the job?
upvoted 0 times
Desiree
3 months ago
C) Access control
upvoted 0 times
...
Dyan
3 months ago
B) First response
upvoted 0 times
...
Ricki
3 months ago
A) Forensic analysis
upvoted 0 times
...
...
Aimee
4 months ago
Incident eradication, easy peasy. Just gotta find the culprit and delete them from existence. Problem solved!
upvoted 0 times
...
Delmy
4 months ago
Access control? Pffft, that's for the IT crowd. Real hackers go straight for the filesystem timeline!
upvoted 0 times
Louvenia
2 months ago
D) Incident eradication
upvoted 0 times
...
Ira
3 months ago
C) Access control
upvoted 0 times
...
Omer
3 months ago
B) First response
upvoted 0 times
...
Diane
3 months ago
A) Forensic analysis
upvoted 0 times
...
...
Marci
4 months ago
First response, no doubt. Gotta be ready to track those virtual footprints before they get swept away.
upvoted 0 times
Linette
3 months ago
B) First response
upvoted 0 times
...
Krissy
3 months ago
A) Forensic analysis
upvoted 0 times
...
...
Isadora
4 months ago
Forensic analysis, of course! I can practically smell the digital breadcrumbs waiting to be uncovered.
upvoted 0 times
Alverta
3 months ago
D) Incident eradication
upvoted 0 times
...
Shawna
3 months ago
I agree, the filesystem timeline is crucial for forensic analysis.
upvoted 0 times
...
Maxima
4 months ago
A) Forensic analysis
upvoted 0 times
...
...
Kami
4 months ago
I think the creation of a filesystem timeline is associated with forensic analysis.
upvoted 0 times
...

Save Cancel