GIAC Foundational Cybersecurity Technologies Practice Test

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the GIAC Foundational Cybersecurity Technologies Test. Utilize flashcards and multiple-choice questions, each with detailed hints and explanations to excel. Boost your readiness for the exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of artifact can a blue team member use to identify the name associated with a file?

  1. Metadata

  2. Windows security logs

  3. Prefetch

  4. File Ownership

The correct answer is: Metadata

The reason metadata is the correct choice in this context is that it contains embedded information about a file, such as the file's name, creation date, last modified date, and ownership details. This information is not just useful for understanding the contents of the file but also for forensic analysis and incident response activities. Metadata can reveal important insights regarding a file's history and usage. While file ownership is also relevant, it is typically a singular piece of information that relates specifically to who created or owns that file rather than the broader set of details contained in metadata. Windows security logs primarily focus on recording security events such as login attempts and access to resources, and prefetch files are designed to optimize application loading rather than directly identify a file's name or characteristics. Therefore, metadata's comprehensive overview makes it the most robust tool for identifying the name associated with a file.