Question #6 should say HUB not switch and switch. So confusing. Cybernauts are you using ChatGTI? or some other AI voice over?
@srishti2k22-iw5dh7 күн бұрын
Requirements.txt error
@izadikram77639 күн бұрын
do you need to install PentestGPT in a application server? or you can install in any VM?
@siviweflatela309022 күн бұрын
Question 23 is wrong the answer is A
@riteshvishwakarma700224 күн бұрын
In question Q1.) "which device is used to control traffic flow on networks.?" The answer should be (C)Router, instead of Switch
@siviweflatela309028 күн бұрын
Question 11 is confusing, I would this B is the answer
@bintiomariwendo2279Ай бұрын
I beg to differ with the answer for question 33...option #a refers to a threat actor or attacker and not a threat. A threat is any action that has the potential to disrupt or adversely affect a system or organization. Thank you all the same for the great job.
@lenso2010Ай бұрын
Is Q2 (1:39) answer correct?what is the first step in incident response planning? I thought before developing anything one should 1st identify critical data and systems
@NaijaEllzАй бұрын
I’m gonna stop procrastinating and take it next week
@abquickfixstudio2366Ай бұрын
I think this content is AI generated that is why so many mistakes, I have doubt on some ques and verify them with ChatGpt and it shows the same answer what GPt answer😂
@abquickfixstudio2366Ай бұрын
Answer for question 38 should be D
@BAEESCOPE20102 ай бұрын
The explanation part repeats the answer agin. So what's the point? You can add more questions and forget about the explanation as we can read it from the book. It will add more questions and will be more useful. Also if the errors can be rectified that would be great. But anyway the videos are very helpful. Thank you.
@user-nl4wj5tf2v2 ай бұрын
The correct answer for Question 8 is:- A hub retransmits the traffic to all connected devices, while a switch selectively routes the traffic to a specific device based on its MAC address.
@je4eva432 ай бұрын
Nice AI
@ethiopiainstituteforeconom14542 ай бұрын
You’re the best!
@jatko20092 ай бұрын
This is so helpful! I'm planning to take CC soon!
@BeckChen2 ай бұрын
Q1 . drive.google.com/file/d/1-Pe19-E3Mx22IkViqzYe3VoF5nj5c11v/view Four main components of Incident Response are: • Preparation • Detection and Analysis • Containment, Eradication and Recovery • Post-Incident Activit
@augustineagyapong65612 ай бұрын
This videos are very helpful passed my exams today
@user-mv7bq5ds9b2 ай бұрын
Congratulations. I am writing my exam on Friday any tips?
@abbaspatel22842 ай бұрын
What is this Trainer name
@augustineagyapong65612 ай бұрын
Question 20 is C
@adowali36713 ай бұрын
CyberNauts, thanks for your excellent videos. I have studied the official study material in the ISC2 website for one week now including your material. I have passed it today. I was glad that I have gone through your videos before I sat for my exam today. Thanks again!
@GHBlvkIce3 ай бұрын
Q1. D
@mature_dgreat3 ай бұрын
I will be writing mine next week. Wish me luck
@made4323 ай бұрын
These questions are too easy😮
@ebensemeha60283 ай бұрын
Please do you have tutorials for CISSP?
@ebensemeha60283 ай бұрын
Thank you for this great tutorial. I just passed my CC exams
@lehman20153 ай бұрын
Thanks for the video, very helpful. Passed the CC today.
@ahmedagamaliyev17983 ай бұрын
q 54 answer should be d
@kebrarawtube3 ай бұрын
Question 27 at 20:32 I think the correct answer is B.
@jaredgeorge21813 ай бұрын
Are these questions the type they actually have on the test?
@vifferent4 ай бұрын
Corrective controls (measures to reduce the likelihood of a recurrence of a given breach) & Recovery controls (measures to restore systems to normal operation)
@ABC612094 ай бұрын
do you have the PDF for all these questions
@SDAdelina4 ай бұрын
SOOO good! Thank you!
@FarhanMerchant4 ай бұрын
Hello ; wanted to Thank you very much ; today I have cleared my CC exam. Your videos were very much helpful in terms of the details and insights that made my fundemetals clear.
@rodrigoms754 ай бұрын
An AI video
@priyaiyer98045 ай бұрын
Q48 doesn't seem to be right as per your explanation..
@crisptophersclub6845 ай бұрын
This video has many errors. I am not sure if the comments about "your resources were very helpful. I passed my CC exam" is an actual comment or a bot. But so many errors make me not want to watch this video tbh.
@bhartsonia5 ай бұрын
My exam is on Monday and I'm going through your videos as a final prep. Wish me Luck.
@mustafadawi56684 ай бұрын
I hope you nailed it!
@coolsaneer5 ай бұрын
Hands down to whoever toook the time and energy to create these practice questions with explanation🖖
@ybentertainment51185 ай бұрын
At 28:00 you have two of the same answers listed
@user-nk6nf5iu1f5 ай бұрын
This Domain 2 is difficult for me as im still makig mistakes , Thank you very much I will keep on repeating im learning a lot .with my IT 10byears experience im embarrased to say im still mixing the jargon.
@FatFreddysKat5 ай бұрын
BEWARE! This video has multiple incorrect and irrelevant information
@maurice20144 ай бұрын
Did you pass tho?
@GTECH-CURITY5 ай бұрын
Thank you so much wish me luck I’m writing tomorrow
@MOHAMMEDISMAIEL-rr4ss2 ай бұрын
HOW WAS IT
@user-ft9gp8nu9j5 ай бұрын
Q:6 wrong
@onurhanyalcn65245 ай бұрын
Q45 should be B
@jevonspringer17193 ай бұрын
Exactly. Human interaction.
@onurhanyalcn65245 ай бұрын
Why this AI guy reads twice?
@onurhanyalcn65245 ай бұрын
Q24 why the best solition is not biometric locks?
@ahmedagamaliyev17983 ай бұрын
i also thought in that way
@onurhanyalcn65243 ай бұрын
@@ahmedagamaliyev1798 i have failed with this questions.
@Publius_Valerius5 ай бұрын
Who chose the sultry intimate voice for this video?
@LordFingers5 ай бұрын
I think the answer to QUESTION 9 should be A. A security incident refers to a violation of a company’s security policy. On the other hand, a security breach is when an unauthorized actor gains access to data, applications, network or devices which results in information being stolen or leaked
@Allistar083 ай бұрын
Funny you mention those so look at it this way. Breach - Internal (Employee) unauthorized access Intrusion - External (hacker) unauthorized access Exploit - External (hacker) deliberate attack Hope this helps.