Thank you so much!! This was a good High level, simple explanation for all of them including examples to tie it all together. Helped me understand for my cissp prep too. Subscribed!
@AdekanleFatai26 күн бұрын
your course looks amazing! Have you considered creating a dedicated sales page to drive more enrollments? I'd love to share some ideas that could help boost your course's visibility. Let me know!
@sweethope1095Ай бұрын
Thank you so much! This video was very helpful and I like the way you explained this. It was very easy to follow so thank you!
@titrekkuyruk8107Ай бұрын
Awesome. Funny intro
@gurkandundarli4883Ай бұрын
when ı use tar -xzvf state.gtz getting local.tgz.ve file. Change name to local.tgz but not working
@ladiatunrase2 ай бұрын
Nice. You laid out the objectives.
@Ebtihals-gy6po3 ай бұрын
last question comptia security+ names "mantrap" as " access control vestibule" now
@OneMoreCasst4 ай бұрын
i missed the question on the phone because it was poorly worded. In the question , it literally didn't even state that the new company didn't hand her a COPE phone. just said reachable. Uhm. My personal phone is reachable and it literally stated that the new company threw that out the window. OK , THEN WHAT IS THE NEW POLICY IN PLACE?
@fastrobreetus4 ай бұрын
Excellent. TY!
@FredYduciel4 ай бұрын
Thanks a lot Sir, just got a new subscriber today....I am currently studying Security+ that's after failing my N10-008 twice, very stressed... Wondering if the security+ exam will be easier for me...pls any advice.Thank you!
@zivelyashiv11694 ай бұрын
Thank you. Great video. Doesn't Anycast support Ipv4 as well? I see many cdns that work with ipv4 and communicate with Anycast
@W3GeekOfficial2 ай бұрын
@zivelyashiv1169 Great question! IPv4 doesn't technically support anycast, no. However, you are correct in that CDNs have figured out ways to simulate what anycast does in the IPv4 standards by using a combination of unicast and BGP. Does that help? 🙂
@UNCLE_KELLAS5 ай бұрын
Very well explained sir
@AutisticBarbie5 ай бұрын
I still don’t understand why #7 is not BYOD 😂
@yashtandon05 ай бұрын
These Mother fuckers had a office in Gurgaon India sector 18 in the name of IHA LLP
@chitrakshijaiswal97135 ай бұрын
You are amazing, you explained it so well in such a small time period. your examples were
@jamesbaysinger97805 ай бұрын
The wording was great! I don’t know why people in the comments say otherwise. Question though, are the question on the real test only going to use acronyms?
@adowali36715 ай бұрын
I have got 9/10 questions correct but still need more practice to have a big bite of the elephant. Thanks David!
@Pwnagotchi-05 ай бұрын
Amazing video, thank you sir
@Lanae81996 ай бұрын
Version 701 seems easier than 601.
@user-zg2bx4oz2p7 ай бұрын
that intro tho :D
@arhamhussain81247 ай бұрын
10/10 - writing it on Monday.
@jamesbaysinger97805 ай бұрын
Did you pass??
@arhamhussain81245 ай бұрын
@@jamesbaysinger9780 yea
@mfaizal20167 ай бұрын
Just take the exam today, however non of this practice question showing up in the exam
@W3GeekOfficial7 ай бұрын
That’s correct. This is not a brain dump. These are to help you gauge your knowledge. Brain dumps are cheating and unethical. :-)
@Iqra-q8x8 ай бұрын
What is three node instability problem soulation
@hoseinhoseiny64948 ай бұрын
not work in ESXI 7.3 becuse format of Local file is .VE
@certificationhub8 ай бұрын
Applause for those spreading free cybersecurity education! I'm adding to the resources with videos on cybersecurity and CompTIA Security+. Let's grow together!
@DevTalksTech8 ай бұрын
Shocked at all of the negative comments around how questions were worded! I thought this was a great review. Thank you!
@PandaneroOW8 ай бұрын
9/10 Good practice! Wish you dove a little bit deeper into the other answers for each question (obviously not the made up ones) but good either way!
@christenw.17269 ай бұрын
Have you written questions for comptia that are used on their exams? Or just similar questions for student practice?
Good review, thanks! Question 7, I’d argue we aren’t given enough information to know if that’s BYOD or COPE. All it says is she needs to be reachable by phone and they threw the COBO concept out the window?
@PandaneroOW8 ай бұрын
BYOD would mean you paid for it and you own it so the company can't put security controls or maintain for you. COPE would mean the company paid for it put correct security controls that regard their policies and practices but you can use it at your will for your personal life.
@jamesbaysinger97805 ай бұрын
The question stated it is a company device so BYOD is out the window
@FireFx4 ай бұрын
@@jamesbaysinger9780the question only states that they don’t use the same policy as her old company. Technically, if they had BYOD, that would still count as throwing the old concept out the window. I got it right cause I assumed what the question implied but the question could state that the new company is giving Janelle a company phone.
@OneMoreCasst4 ай бұрын
you are 100% correct on that poorly worded question. I wrote a comment on that as well above.
@painrelief34413 ай бұрын
Here's my interpretation of the question: Nowhere did the question stated that the person was allowed to bring their own device. Since that information was lacking, it would be good to assume she is still having the company provide the device in question since the story never explicitly stated she could bring her own. In this sense, the company is using a Mobile Device Management (MDM) tool to protect the data on the phone and prevent her from accessing it unless she is on company property.
@Choober659 ай бұрын
What about going after their PAYMENT PROCESSORS?? You tracked down their WEBSITES, that is very easy to do, what you SHOULD be showing us is how to track down the SPAMMER themselves to enable us to pinpoint their ISP. When we can do that, we can actually go for a prosecution by engaging a local laywyer and filing in court. 90% are Namecheap. I have REPEATEDLY contacted their abuse department (useless jerkoffs). I've threatened legal action, paying them a visit, and NOTHING works. I've even reported them to the FBI. Namecheap need shutting down. They are assholes. If SOMEONE in the US wants to help me take Namecheap to court for MILLIONS of $$$$, lets do it and split the winnings.
@brucechambliss68729 ай бұрын
It's 84.99 and comes with 2 practice tests. Probably time to take this ad down.
@hi_im_patrick9 ай бұрын
My interpretation of Question 1 focused on the fact that Jared manages *critical applications* for his org. If he's considering a secondary location, with a *cloud service provider* in mind, the only answer that comes to mind is D. Hot Site. To explain, a cold site requires far too much time to get set up, a warm site is better but still usually takes several hours, and a mobile site isn't valid because the question says nothing about needing a transportable and physical set of assets. The new secondary location is already going to be on the cloud, after all. A hot site on the cloud enables Jared and the org to very quickly restore access and functionality to the critical assets mentioned, making it the correct choice. If I got anything wrong, feel free to reply. I'll be taking and passing the Sec+ soon, and welcome any feedback :)
@W3GeekOfficial9 ай бұрын
You’re right on the money! Good job!
@hi_im_patrick9 ай бұрын
@@W3GeekOfficial Heck yeah! Thanks for the quick reply :) I originally started doubting my answer once I read some of the comments by people confused by Q1, so I had to do a quick write-up to double-check that I wasn't losing my mind. Glad I had it all right in the end! Keep up the good work David, loving the videos so far.
@bigtrunx10 ай бұрын
these questions were worded so terribly LOL hopefully people arent using this as a final check before taking the real exam
@tewodroskebede16219 ай бұрын
Why, please ? What do you suggest? Thanks in advance.
@TechAceYoutube6 ай бұрын
They're fine.
@AdamMashburn10 ай бұрын
this video is an ad
@luchendrix9911 ай бұрын
Thanks for this David, scored 9/10, questions made sense. Hoping to take the 701+ soon.
@israelayemoba11 ай бұрын
Hello , I’m interested in becoming a cyber security expert. I see a lot of questions and answers video. I really enjoy your explanations and analysis on the new 701. Could you please tell me the best study book to get for the exam. Your response will be highly helpful
@ao451411 ай бұрын
Hello Dave, can you please include more contents on CompTIA Network and Security+ Many thanks 👍
@jimmyboy158211 ай бұрын
I passed this a couple of years ago but I like listening related videos refresh my memory.
@123ChrisG Жыл бұрын
Very helpful thank you
@W3GeekOfficial Жыл бұрын
You're quite welcome! Glad it was helpful!
@123ChrisG Жыл бұрын
On question 10 you said “and anyone can decrypt that hash with our public key” . However that premise is false because a hashed password cannot be decrypted.
@W3GeekOfficial Жыл бұрын
Thanks for commenting! This is an area where a lot of people get confused. When I said "decrypt the hash", I mean that we're storing the hash inside of an encrypted message. So we have to decrypt the message containing the hash so that we can view the hash and compare it with the hash that we take of the message. Does that help clarify things? :-)
@123ChrisG Жыл бұрын
@@W3GeekOfficial aha yes gotcha! Makes sense now! 🙌
@pierrepaulestime3333 Жыл бұрын
9/10. i think the first answer could be warm too
@W3GeekOfficial Жыл бұрын
Hi! Thanks for the comment! Remember that a warm site can potentially take hours to become live. If the company has a critical application, as mentioned in the first part of the question, then a hot site is going to be their best option.
@CallBoy1212 Жыл бұрын
The first question is worded really terribly, but even with getting that wrong I got eight out of 10
@W3GeekOfficial Жыл бұрын
Hi! Thanks for the comment! I'm always open to suggestions to be able to continuously improve the content I create! Can you suggest a better way to word question number 1? What did you find confusing about it? Thanks for any suggestions or feedback, I appreciate it!
@jamesbaysinger97805 ай бұрын
My understanding is that the cloud can act as both a warm and a hot site but most companies would use it as a hot site in this scenario since the company only has 1 data center atm having a hot site would serve them much better incase something goes wrong with site numero uno
@CallBoy12125 ай бұрын
@@W3GeekOfficialit doesn’t specify if he is wanting to ACTUALLY create a hot site or a warm site. It’s just inferring that he wants to do something for another site
@abhiramt.g4448Ай бұрын
Yeahh same😢
@KevinKake_ Жыл бұрын
this was simply wonderful
@W3GeekOfficial Жыл бұрын
Thank you! I'm glad you enjoyed them!
@vincentkashaka394 Жыл бұрын
Great work
@W3GeekOfficial Жыл бұрын
Thank you!
@ahgeez943 Жыл бұрын
Started out rough and rallied back to a 7/10. More studying to do!
@W3GeekOfficial Жыл бұрын
It's a tough exam for sure! Best of luck!
@anantpardeshi9887 Жыл бұрын
Sir, 9th answer is wrong. As the systems are running Windows NT 4.0 for manufacturing purpose, it should be D) SCADA.
@W3GeekOfficial Жыл бұрын
Actually, answer D - SCADA - is what is known as a distractor. It’s meant to sound like a valid answer while still being wrong. Yes, SCADA - Supervisory Control and Data Acquisition systems are used in factories and manufacturing plants. Remember to look at what the question is actually asking though - what is the best method of securing this system. When you use a legacy system like Windows NT 4.0, the BEST method of SECURING those systems is to air gap them. That is, disconnecting them from the network altogether or running them on a standalone network that cannot be accessed from outside of the facility. A SCADA system could describe what the Windows NT machine is doing - reading sensors and controlling valves or other types of PLCs. But it wouldn’t be the best method of securing the system. Does that explanation help?
@Jamari_Brown10 ай бұрын
Although I got this one right I can see how someone would be confused. I think most people would expect the question to say it's connected to another network. What gave the answer away was that it's a legacy system so it's not receiving updates and patches which would make it vulnerable. The best way to secure a vulnerable system is not have it connected not directly at least.