Profitearner's profile picture. I am a cyber security Expert and a network engineer, a SoC analyst .This is my official Twitter account, Any tweet from me will be signed ®. N8849MYD

chimdi

@Profitearner

I am a cyber security Expert and a network engineer, a SoC analyst .This is my official Twitter account, Any tweet from me will be signed ®. N8849MYD

Women science dey confuse me. Instead of wearing waist beads to trap rich man, why not wear the one that will make you rich? Someone will come and say my prayers and grace made you rich, why can't your prayers and grace make you and your brothers rich? What a wonder.


Men are not natural providers and nurturers by nature, you have been lied to for a very long time . I will make a post on this today ,so that we can unlearn a lot of things and live happily. We have been deceived for years and that has caused a lot of issues.


Audit trail logs showed that a bank employee accessed customer accounts and transferred funds to a personal bank account. Which of the following describes this action? A. Social engineering B. Insider threat C. Third party risk D. Data breach.


Keeping fit .

Profitearner's tweet image. Keeping fit .
Profitearner's tweet image. Keeping fit .
Profitearner's tweet image. Keeping fit .
Profitearner's tweet image. Keeping fit .

Which of these CANNOT be a corrective security control? A. Patches B. Backups C. Bollards D. Disaster Recovery Plan


Corrective security controls are measures used to address security vulnerabilities or weaknesses already identified. Backups, patches, and Disaster Recovery Plans are all corrective security controls C. Bollards✅


What is the name of the network tool that changes and maps source addresses of client requests for client anonymity? A. A router B. A gateway C. A proxy D. A firewall


In an incident response process, which phase uses indicators of compromise and log analysis as part of a review of events? A. Preparation B. Eradication C. Identification D. Containment


Which of these is NOT a typical component of a comprehensive business continuity plan (BCP)? A. A cost prediction of the immediate response procedures B. Immediate response procedures and checklists C. Notification systems and call trees for alerting personnel


(★) Which type of recovery site has some or most systems in place, but does not have the data needed to take over operations? A. A hot site B. A cloud site C. A warm site D. A cold site


What does the term 'data remanence' refer? A. Data in use that can't be encrypted B. Files saved locally that can't be remoted accessed C. Data left over after routine removal and deletion D. All of the data in a system


Which are the six phases of data handling? A. Create → Share → Store → Use → Archive → Destroy B. Create → Share → Use → Store → Archive → Destroy C. Create → Use → Store → Share → Archive → Destroy D. Create → Store → Use → Share → Archive → Destroy

Why do you want to become a Cybersecurity expert in 90days? Have you forgotten that Rome was not built in 90 days?



Which of these social engineering attacks sends emails that target specific individuals? A. Pharming B. Whaling C. Vishing D. Spear phishing


Which kind of document outlines the procedures ensuring that vital company systems keep running during business- disrupting events? A. Business Impact Analysis B. Business Impact Plan C. Business Continuity Plan D. Disaster Recovery Plan


Which of these documents is MORE directly related to what can be done with a system or with its information? A. SLA B. MOA C. MOU D. ROE


When looking for cybersecurity insurance, which of these is the MOST IMPORTANT objective? A. Risk acceptance B. Risk transference C. Risk avoidance D. Risk spreading


Which of the following is an example of an administrative security control? A. No entry signs B. Access Control Lists C. Acceptable Use Policies D. Badge Readers


Loading...

Something went wrong.


Something went wrong.