q16 . right answer is a not b , a power outage that causes major disruption in a company’s operations, the appropriate plan to restore normal operations would be a Disaster Recovery Plan (DRP), not a Business Continuity Plan (BCP).
@rul4sАй бұрын
Question 17 - non of above A) Single Factor authentication B) Single Factor C) Access Control D Policy Right answer is A+B
@happyhiker6322Ай бұрын
where is Domain 5?
@vuyogcanga96653 ай бұрын
Material is outdated. Wrote my exam and non of these were there. Make sure to study first. 😉
@prateekmittal62403 ай бұрын
Hi @CyberNauts: The response of Q8 should be option 'B', not 'C'. The response of Q54 should be "None". As none of the option is correct. MFA is based on two or more different factors.
@nambiar19713 ай бұрын
Anoop nambiar from Kerala, india. Have cleared the exam first attempt yesterday. This video series has been very useful and has immensely contributed for the same. Thank you and hope you come out with more such informative sessions. 🌹
@dalefirmin51183 ай бұрын
Q38. The answer depends on the traffic. If it is a Ping Flood (ICMP) then it is L3 Network Layer. If it is a SYN Flood, then it is L4 Transport Layer. If it is routable but garbage packets, then it is L3.
@dalefirmin51183 ай бұрын
Q37. Intercepting network traffic in a MITM attack is a L3 attack but injected malicious packets is an L4 attack.
@junaydullah133Ай бұрын
Thanks bro, that one confused me
@dalefirmin51183 ай бұрын
Q36. DNS is a server that usually runs on a router but that doesn't mean that it is L3 or L4. It is an application and therefore L7.
@dalefirmin51183 ай бұрын
Q18. Radius authentication is also registered port numbers.
@dalefirmin51183 ай бұрын
Q5 answer is D and the description defines it as D. Answer B is incorrect because wired connection of network devices can use standards other than Ethernet. One example is FibreChannel, which is also over copper wire. Another is routing protocols like RIP, ATM and OSPF. They use the same UTP or STP wires but the formatting of the traffic is different. Ethernet is a protocol at Layer 2--not wire (physical) Layer 1.
@sazzadhossainnayem30734 ай бұрын
Answer 9 will be breach. not intrusion.
@virman89394 ай бұрын
Can we install this in windows 11??
@jonathanonijingin30004 ай бұрын
Thanks Guys. I passed my exam today.
@londalujan97064 ай бұрын
Did the videos help?
@brightndubuisi57164 ай бұрын
Congratulations 🎉man ! I also have exam next week
@saglamairdropstrongairdrop4954 ай бұрын
can anyone explain between difference question 15-16
@explore51304 ай бұрын
Question 33 was wrongfully answered.
@brightndubuisi57164 ай бұрын
Sir, it is correct, I depends on how you understand it, different definition but same mean.
@explore51304 ай бұрын
Does getting along with these questions guarantee passing the CC?
@makkamao4 ай бұрын
audio is terrible-ble. question four-our. The correct answer is five-ive...
@revolutionsady15 ай бұрын
Q.54 answer is D, instead of C, checked with isc2
@revolutionsady15 ай бұрын
Question 48-you shown the correct answer is B ( Treat Probability)---but the correct answer will be A (Threat likelihood) - I confirmed this with ISC2 Thank you in Advance to update this.
@brandogenius5 ай бұрын
good job here is their a ch 5 for this
@skqq32505 ай бұрын
Question #6 should say HUB not switch and switch. So confusing. Cybernauts are you using ChatGTI? or some other AI voice over?
@srishti2k22-iw5dh5 ай бұрын
Requirements.txt error
@izadikram77636 ай бұрын
do you need to install PentestGPT in a application server? or you can install in any VM?
@siviweflatela30906 ай бұрын
Question 23 is wrong the answer is A
@riteshvishwakarma70026 ай бұрын
In question Q1.) "which device is used to control traffic flow on networks.?" The answer should be (C)Router, instead of Switch
@dalefirmin51183 ай бұрын
Switches also control traffic flow on networks by sending traffic based on their physical address (MAC) whereas routers control traffic flow based on their logical address (IP).
@siviweflatela30906 ай бұрын
Question 11 is confusing, I would this B is the answer
@bintiomariwendo22797 ай бұрын
I beg to differ with the answer for question 33...option #a refers to a threat actor or attacker and not a threat. A threat is any action that has the potential to disrupt or adversely affect a system or organization. Thank you all the same for the great job.
@revolutionsady15 ай бұрын
No, Threat can be person or thing that takes action or may take action to exploit vulnerability
@lenso20107 ай бұрын
Is Q2 (1:39) answer correct?what is the first step in incident response planning? I thought before developing anything one should 1st identify critical data and systems
@stringbean34423 ай бұрын
If you look at the incident management prosess the steps are 1.preperation 2.detection and analyses etc. Answer a would form part of bcp which comes before the incident management process. These types questions can be confusing.
@_lovers__zone3 ай бұрын
both options A and B fall under "preparation" which is the first component, but when going through the breakdown under it, developing a policy approved by the management comes before identifying critical data and system.
@NaijaEllz7 ай бұрын
I’m gonna stop procrastinating and take it next week
@digiverse76863 ай бұрын
How did it go?
@abquickfixstudio23667 ай бұрын
I think this content is AI generated that is why so many mistakes, I have doubt on some ques and verify them with ChatGpt and it shows the same answer what GPt answer😂
@abquickfixstudio23667 ай бұрын
Answer for question 38 should be D
@BAEESCOPE20107 ай бұрын
The explanation part repeats the answer agin. So what's the point? You can add more questions and forget about the explanation as we can read it from the book. It will add more questions and will be more useful. Also if the errors can be rectified that would be great. But anyway the videos are very helpful. Thank you.
@GurwinderKaur-h1t7 ай бұрын
The correct answer for Question 8 is:- A hub retransmits the traffic to all connected devices, while a switch selectively routes the traffic to a specific device based on its MAC address.
@ethiopiainstituteforeconom14547 ай бұрын
You’re the best!
@jatko20097 ай бұрын
This is so helpful! I'm planning to take CC soon!
@BeckChen8 ай бұрын
Q1 . drive.google.com/file/d/1-Pe19-E3Mx22IkViqzYe3VoF5nj5c11v/view Four main components of Incident Response are: • Preparation • Detection and Analysis • Containment, Eradication and Recovery • Post-Incident Activit
@augustineagyapong65618 ай бұрын
This videos are very helpful passed my exams today
@LeeAudreyMthembu8 ай бұрын
Congratulations. I am writing my exam on Friday any tips?
@augustineagyapong65618 ай бұрын
Question 20 is C
@ubi-wan-kenobi4 ай бұрын
Thank you. Finally. I’m not gonna be confused on something i spent a whole day dedicating to grasping
@GHConfidential8 ай бұрын
Q1. D
@mature_dgreat8 ай бұрын
I will be writing mine next week. Wish me luck
@ebensemeha60289 ай бұрын
Please do you have tutorials for CISSP?
@ebensemeha60289 ай бұрын
Thank you for this great tutorial. I just passed my CC exams
@lehman20159 ай бұрын
Thanks for the video, very helpful. Passed the CC today.
@ahmedagamaliyev17989 ай бұрын
q 54 answer should be d
@kebrarawtube9 ай бұрын
Question 27 at 20:32 I think the correct answer is B.
@jaredgeorge21819 ай бұрын
Are these questions the type they actually have on the test?
@brandogenius4 ай бұрын
I’ve went through most of this for the CC exam best to double check you might want to purchase the $26 e-book from Isc2 versus going completely off of KZbin for the test itself
@vifferent9 ай бұрын
Corrective controls (measures to reduce the likelihood of a recurrence of a given breach) & Recovery controls (measures to restore systems to normal operation)