EverlastCyber
EverlastCyber
  • 162
  • 34 173
NACC - PSW Certification - Module 5 - Abuse & Neglect | Exam Prep 👩‍⚕️
Are you preparing for the NACC Personal Support Worker (PSW) exam?
In this video, we’ll guide you through the key topics covered in the 12 essential modules of the NACC-PSW curriculum, including practical tips and strategies to help you succeed. From infection control to assisting with personal care, our breakdown makes studying manageable and effective.
Get ready to boost your confidence with practice questions, answer explanations, and insights into what to expect on test day.
Let’s make your NACC-PSW exam preparation a success!
Don't forget to like, share and subscribe for more exam prep videos and success tips for your PSW journey!
#psw #nacc #pswnacc #everlastcyber #naccpsw #naccpswexamprep #PSWFoundations
#SafetyandMobility #BodySystem #personalhygeine #Assisting #assistingwithPersonalHygiene #AbuseandNeglect #Householdmanagement #Nutrition #hydrationtherapy #Careplanning #RestorativeCare #Documentation #workinginthecommunity #Assistingthefamily #growthandDevelopment #AssistingtheDyingPerson #medicationfree #mentalhealthpsw #CognitiveandMentalHealthissues #HealthConditions
Disclaimer - These are not the exact questions from the NACC certification Exams, however by studying with these practice questions, you will understand how the concepts of each module and how best to answer any questions you encounter.
มุมมอง: 4

วีดีโอ

NACC - PSW Certification - Module 4 - Personal Hygiene | Exam Prep 👩‍⚕️
มุมมอง 372 ชั่วโมงที่ผ่านมา
Are you preparing for the NACC Personal Support Worker (PSW) exam? In this video, we’ll guide you through the key topics covered in the 12 essential modules of the NACC-PSW curriculum, including practical tips and strategies to help you succeed. From infection control to assisting with personal care, our breakdown makes studying manageable and effective. Get ready to boost your confidence with ...
NACC - PSW Certification - Module 3 - Body System | Exam Prep 🦵🫀🫁
มุมมอง 397 ชั่วโมงที่ผ่านมา
Are you preparing for the NACC Personal Support Worker (PSW) exam? In this video, we’ll guide you through the key topics covered in the 12 essential modules of the NACC-PSW curriculum, including practical tips and strategies to help you succeed. From infection control to assisting with personal care, our breakdown makes studying manageable and effective. Get ready to boost your confidence with ...
NACC - PSW Certification - Module 2 - Safety & Mobility | Exam Prep 👩‍⚕️
มุมมอง 5512 ชั่วโมงที่ผ่านมา
Are you preparing for the NACC Personal Support Worker (PSW) exam? In this video, we’ll guide you through the key topics covered in the 12 essential modules of the NACC-PSW curriculum, including practical tips and strategies to help you succeed. From infection control to assisting with personal care, our breakdown makes studying manageable and effective. Get ready to boost your confidence with ...
NACC - PSW Certification - Module 1 - PSW Foundations | Exam Prep 👩‍⚕️
มุมมอง 11314 ชั่วโมงที่ผ่านมา
Are you preparing for the NACC Personal Support Worker (PSW) exam? In this video, we’ll guide you through the key topics covered in the 12 essential modules of the NACC-PSW curriculum, including practical tips and strategies to help you succeed. From infection control to assisting with personal care, our breakdown makes studying manageable and effective. Get ready to boost your confidence with ...
Cybersecurity Certification Preps
มุมมอง 6316 ชั่วโมงที่ผ่านมา
Subscribe and turn on your notifications for Cybersecurity Certification exam Preps #ciscocertified #ciscoprep #everlastcyber #ccnaprep #everlastcyber #ciscocertified #socanalyst #everlastcyber 💻 #itsupportservices #TechMemes #ithelpdesk #technomemes #everlastcyber #cybermemes #cybersecuritymemes #eccouncilcertifications #criscexam #everlastcyber #crisccertification #topscoreexam #riskmanager #...
Salesforce Data Cloud ☁️ Exam Prep!✅️
มุมมอง 4219 ชั่วโมงที่ผ่านมา
The Salesforce Data Cloud certification is designed for individuals who have experience with Salesforce and continuously look for ways to assist their companies in getting even more from additional features and capabilities. In this video, we cover key topics that you'll encounter on the exam, providing you with the knowledge and confidence needed to succeed. Don't forget to like, share, and su...
CCNA Exam Prep: Boost Your Score With This Video! | Top Score
มุมมอง 31621 วันที่ผ่านมา
CCNA Exam Prep: Boost Your Score With This Video! | Top Score
CRISC Exam Prep (Tips + Practice Questions For Top Score)
มุมมอง 10021 วันที่ผ่านมา
CRISC Exam Prep (Tips Practice Questions For Top Score)
AWS Certified Cloud Practitioner Exam: Boost Your Score With This Video! | Top Score
มุมมอง 21228 วันที่ผ่านมา
AWS Certified Cloud Practitioner Exam: Boost Your Score With This Video! | Top Score
SOC Analyst Exam Prep with In-depth Explanations | 90% Score
มุมมอง 103หลายเดือนก่อน
SOC Analyst Exam Prep with In-depth Explanations | 90% Score
QA Interview Prep (Tips + Practice Questions)!✅️
มุมมอง 22หลายเดือนก่อน
QA Interview Prep (Tips Practice Questions)!✅️
Penetration Test+ Exam Prep: 25 Practice Q & A!✅️
มุมมอง 61หลายเดือนก่อน
Penetration Test Exam Prep: 25 Practice Q & A!✅️
CompTIA Security+ 701: Revised Practice Questions 2024✅️| 800+ Score
มุมมอง 1742 หลายเดือนก่อน
CompTIA Security 701: Revised Practice Questions 2024✅️| 800 Score
CC Revised Practice Questions And Answers | All Domains | 800+ Score
มุมมอง 4872 หลายเดือนก่อน
CC Revised Practice Questions And Answers | All Domains | 800 Score
Salesforce Admin Exam Prep!🖥️| 80%+ Score✅️
มุมมอง 312 หลายเดือนก่อน
Salesforce Admin Exam Prep!🖥️| 80% Score✅️
CompTIA A+: Mobile Device Accessories, Connectors And Ports 📳🖥️📱🔌
มุมมอง 2042 หลายเดือนก่อน
CompTIA A : Mobile Device Accessories, Connectors And Ports 📳🖥️📱🔌
Unlocking Cryptography: Your Guide to Security Certifications
มุมมอง 1942 หลายเดือนก่อน
Unlocking Cryptography: Your Guide to Security Certifications
CompTIA A+: Understanding Cables, Ports and Connectors 🔌🔌
มุมมอง 2863 หลายเดือนก่อน
CompTIA A : Understanding Cables, Ports and Connectors 🔌🔌
CompTIA A+ | 800+ Score | TCP/UDP Ports and Protocols
มุมมอง 2193 หลายเดือนก่อน
CompTIA A | 800 Score | TCP/UDP Ports and Protocols
15 Powerful CMD Commands To Pass CompTIA A+ Exam | 800+ Score
มุมมอง 1993 หลายเดือนก่อน
15 Powerful CMD Commands To Pass CompTIA A Exam | 800 Score
Networking Cables Rundown For CompTIA A+ Exam 🔌
มุมมอง 5373 หลายเดือนก่อน
Networking Cables Rundown For CompTIA A Exam 🔌
A-Z Acronyms For Network+ Exam✅️ | 800+ Score
มุมมอง 1163 หลายเดือนก่อน
A-Z Acronyms For Network Exam✅️ | 800 Score
Canadian Express Entry Draws April - July 2024 🍁
มุมมอง 213 หลายเดือนก่อน
Canadian Express Entry Draws April - July 2024 🍁
CANADA: NEW WORK PERMIT RULES IN 2024 🍁🇨🇦
มุมมอง 2803 หลายเดือนก่อน
CANADA: NEW WORK PERMIT RULES IN 2024 🍁🇨🇦
CISSP Practice Questions and Answers | 800+ Score
มุมมอง 4.1K3 หลายเดือนก่อน
CISSP Practice Questions and Answers | 800 Score
Network Types You Should Know For CompTIA A+ | 800+ Score
มุมมอง 5903 หลายเดือนก่อน
Network Types You Should Know For CompTIA A | 800 Score
A-Z Acronyms For Security+ Exam✅️ | 800+ Score
มุมมอง 2093 หลายเดือนก่อน
A-Z Acronyms For Security Exam✅️ | 800 Score
CompTIA Network+ | 800+ Score | 25 Practice Questions and Answers With Explanations
มุมมอง 7603 หลายเดือนก่อน
CompTIA Network | 800 Score | 25 Practice Questions and Answers With Explanations
Virtualization & Cloud Computing: CompTIA A+ Practice Questions☁️
มุมมอง 983 หลายเดือนก่อน
Virtualization & Cloud Computing: CompTIA A Practice Questions☁️

ความคิดเห็น

  • @KachisidinmaMbah
    @KachisidinmaMbah 9 วันที่ผ่านมา

    thank you for this video. i will be taking the certification exam soon

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 9 วันที่ผ่านมา

      I am happy you found this useful

  • @shahnawajalam2904
    @shahnawajalam2904 13 วันที่ผ่านมา

    Does the real exam has the same level of questions??

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 9 วันที่ผ่านมา

      The questions are constantly changing but the format is the same

  • @Blink-c9k
    @Blink-c9k 14 วันที่ผ่านมา

    Thank you for your videos . I understand some terms better than before

  • @Blink-c9k
    @Blink-c9k 14 วันที่ผ่านมา

    Thank you for your videos . I understand some terms better than before

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 14 วันที่ผ่านมา

      @@Blink-c9k glad you found them helpful

  • @joshgloballlc3500
    @joshgloballlc3500 19 วันที่ผ่านมา

    th-cam.com/video/SGwhE-T8kq8/w-d-xo.htmlsi=lOmtQ3GF4o7QOied

  • @joshgloballlc3500
    @joshgloballlc3500 19 วันที่ผ่านมา

    th-cam.com/video/SGwhE-T8kq8/w-d-xo.htmlsi=phyIrsDw5_IOLgUR

  • @shahnawajalam2904
    @shahnawajalam2904 20 วันที่ผ่านมา

    Will Questions be of the same level in the real CISSP exam ???

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 9 วันที่ผ่านมา

      The format of the questions is the same... remember, for CISSP, you have to think like a manager

  • @GabrielaMarquesmoi
    @GabrielaMarquesmoi 28 วันที่ผ่านมา

    Thank you for your explanation. This was a good way to learn.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 28 วันที่ผ่านมา

      I am glad you found this helpful

  • @aminhamid9757
    @aminhamid9757 หลายเดือนก่อน

    22-it only execute but hr set the direction..Think like manager because cissp not technical exam.if this q not for cissp exam definitely it people

  • @jherrera8530
    @jherrera8530 หลายเดือนก่อน

    The video is good but could you please edit the audio because it is barely audioble?

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 22 วันที่ผ่านมา

      Thank you for the feedback. More recent videos are recorded without the background music so the audio is clearer

  • @drumdee1
    @drumdee1 หลายเดือนก่อน

    Very understanding and deep insights. Thanks

  • @prajaktawalawalkar7252
    @prajaktawalawalkar7252 หลายเดือนก่อน

    Thank you for sharing the video.Not able to understand star integrity Axiom example given in the video, Rest of the video is great source for clearing all the doubts related to security model

  • @fouadahmed7777
    @fouadahmed7777 หลายเดือนก่อน

    Despite there are few wrong answers, I would like to thank you for your efforts trying to help CISSP cert applicants. Please review the comments, make necessary correction and re-upload your video

  • @fouadahmed7777
    @fouadahmed7777 หลายเดือนก่อน

    Q16. Risk assessment in the Software Development Life Cycle (SDLC) is typically conducted during the planning and requirement analysis phase. This phase involves identifying potential risks, assessing their impact, and planning mitigation strategies. The results of this risk assessment are then used to supplement baseline security controls, ensuring that the software development process addresses potential vulnerabilities from the outset. However conducting a risk assessment and using the results to supplement baseline security controls should be a key activity during the development and acquisition phases of a software project. Here's why: Development Phase: Proactive Risk Management: Identifying potential risks early in the development process allows for proactive measures to be taken to mitigate them. Security by Design: Incorporating security controls based on identified risks can help ensure that the software is built with security in mind. Cost-Effective: Addressing security issues early on can be more cost-effective than trying to fix them later in the development cycle. Acquisition Phase: Vendor Evaluation: Risk assessments can help evaluate potential vendors and their security practices. Contract Negotiation: The results of the risk assessment can be used to negotiate appropriate security terms and conditions in the contract. Due Diligence: Conducting a risk assessment can help ensure that due diligence is performed on the acquired software and its associated risks. By conducting a risk assessment and using the results to supplement baseline security controls, organizations can significantly reduce their exposure to security threats and improve the overall security posture of their software systems.

  • @fouadahmed7777
    @fouadahmed7777 หลายเดือนก่อน

    Q #2 Answer is incorrect. Escrow agreements typically take place during the deployment and maintenance phases of the software acquisition life cycle. Here's a breakdown of why: Deployment: Once the software is developed and tested, it's often deployed to a production environment. An escrow agreement can be put in place to ensure that a backup copy of the software's source code is held by a neutral third party. This protects the buyer in case the seller becomes unavailable or goes out of business. Maintenance: Throughout the software's lifecycle, updates, patches, and bug fixes may be required. An escrow agreement can provide a mechanism for accessing the source code if the original developer is no longer able or willing to provide support. While escrow agreements can be established at other phases of the software acquisition life cycle, such as during contract negotiation, they are most commonly implemented during deployment and maintenance to address the risks associated with software ownership and continuity.

  • @fouadahmed7777
    @fouadahmed7777 หลายเดือนก่อน

    Question number 1 the answer is B.. Requirement gathering is indeed one of the most critical steps in the secure software development life cycle (SDLC) for preventing security vulnerabilities. Here's why: Foundation for Security: A clear and comprehensive understanding of the software's intended functionality, security requirements, and potential risks is essential for building a secure system.

  • @fouadahmed7777
    @fouadahmed7777 หลายเดือนก่อน

    Q.14 Provenance Methodology Provenance refers to the origin and history of a product or service. A provenance methodology is a set of processes and techniques used to verify the authenticity, origin, and journey of ICT products throughout the supply chain. Key Components of a Provenance Methodology: Traceability: The ability to track the movement of ICT products from their point of origin to their final destination. Transparency: The disclosure of information about the supply chain, including the identities of suppliers, manufacturing processes, and ethical practices. Verification: The use of evidence and documentation to confirm the authenticity and quality of ICT products. Ethical Sourcing: The commitment to sourcing ICT products from suppliers that adhere to ethical and sustainable practices. Implementing a Provenance Methodology Identify Critical Components: Determine which components of ICT products are most susceptible to counterfeiting, child labor, or other risks. Establish Traceability Systems: Implement systems to track the movement of these components throughout the supply chain, such as barcodes, QR codes, or blockchain technology. Conduct Audits and Verifications: Conduct regular audits and verifications of suppliers and manufacturing facilities to ensure compliance with ethical and sustainable practices. Educate Stakeholders: Educate employees, customers, and partners about the importance of provenance and the steps being taken to address supply chain risks. Collaborate with Industry Partners: Work with other companies in the ICT industry to develop shared standards and best practices for supply chain transparency and accountability. By implementing a robust provenance methodology, businesses can mitigate risks, enhance their reputation, and contribute to a more sustainable and ethical ICT supply chain.

  • @chinenyembah9361
    @chinenyembah9361 2 หลายเดือนก่อน

    😂

  • @ravivijaykar1018
    @ravivijaykar1018 2 หลายเดือนก่อน

    Good one

  • @antetawukaleh294
    @antetawukaleh294 2 หลายเดือนก่อน

    There are very helpful and excellent questions. Thank you

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      @@antetawukaleh294 Glad it helps

  • @ubi-wan-kenobi
    @ubi-wan-kenobi 2 หลายเดือนก่อน

    And also number 35 ans should be B not C. DRP ensures IT is being restored and at full or partial operation( A written plan for processing critical applications in the event of a major hardware or software failure or destruction of facilities) while BCP is to sustain business operations while recovering from a significant disruption.

  • @ubi-wan-kenobi
    @ubi-wan-kenobi 2 หลายเดือนก่อน

    Thank you for this video but there's nothing like a mirror site. There are just three redundant sites - Cold, Warm, and Hot.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Thank you for your feedback. We also have a Mirror site which is specifically for redundancy and load distribution. The main goal of answering questions for the exam is to choose the BEST answer based on the question being asked. A mirror site is just an option and does not apply to the question being asked.

  • @GenzclubXD
    @GenzclubXD 2 หลายเดือนก่อน

    I just love the way you explain all other options making it clearer. Good job 👍

  • @tundeshonubi3255
    @tundeshonubi3255 2 หลายเดือนก่อน

    Thanks Everlast much appreciated will check this out later in the week

  • @carolynlambert8797
    @carolynlambert8797 2 หลายเดือนก่อน

    great pics! thanks

  • @carolynlambert8797
    @carolynlambert8797 2 หลายเดือนก่อน

    taking exam in one week

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Good luck! Let's know how it goes

  • @carolynlambert8797
    @carolynlambert8797 2 หลายเดือนก่อน

    love it!

  • @ShakeelAhmed-lu9hj
    @ShakeelAhmed-lu9hj 2 หลายเดือนก่อน

    For question 3 right answer is risk avoidenxe

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Risk avoidance would mean that she is changing her overall business model but in this case she is accepting the potential revenue loss and compliance risk. However based on the scenario presented, Alice's decision to forgo credit card payments due to the high cost of PCI DSS compliance aligns with the concept of risk acceptance as she is accepting the risk of not meeting PCI DSS standards and potential revenue loss because she has determined that the costs of compliance are too high compared to the benefits. The BEST answer is Risk Acceptance.

    • @UniversalEngineer
      @UniversalEngineer 2 หลายเดือนก่อน

      It appeared that Alice chose not to proceed with this additional line of business. The question was unclear on the SPECIFIC action that Alice took.

    • @bellor7167
      @bellor7167 หลายเดือนก่อน

      I think the way the question was structured wasn't specific enough..., but If I am correct, Risk Acceptance is the best choice, because I guess Alice accepted her current mode of card payment... the correct answer is not based on the decision of not going for PCI-DSS option. However, Risk avoidance would be best if Alice realized the risk of her current transaction of card payment is higher or cannot be easily mitigate compared to the PCI DSS.

  • @ubi-wan-kenobi
    @ubi-wan-kenobi 2 หลายเดือนก่อน

    How is question 11 C?? Firewalls and SIEM both carry out automated workflow thru ML. Or am i learning wrongly

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Firewalls filter traffic but does not automate responses based on threats. SIEM identifies and collects security data but does not typically automate responses. SOAR on the other hand is designed specifically to identify threats AND carry out automated responses based on predefined workflows, and this matches the question criteria. Firewalls and SIEM both are important security tools, however they do not have the same level of automation in response execution as SOAR does. Remember that when answering questions, you have to select the answer that BEST aligns with the question being asked.

  • @tundeshonubi3255
    @tundeshonubi3255 2 หลายเดือนก่อน

    Absolute brilliant as always thank you. I done my CC last year but still checking this out for refresher. I will also share with a group that would appreciate it as some are prep for their CC or need to redo. Thanks

  • @AnilKumar-zo2eu
    @AnilKumar-zo2eu 2 หลายเดือนก่อน

    Thank you so much mam for your packaged information.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      I am glad the video was able to help you in your certification journey!

  • @ChinwenduOkongwu
    @ChinwenduOkongwu 2 หลายเดือนก่อน

    Edit: The correct answer for Question 11 is option A. Business Continuity. This is because it includes the vendor's ability to recover from disruptions, which is essential to maintaining the security and availability of your data and services.

  • @madz1131
    @madz1131 2 หลายเดือนก่อน

    Q27 official study guide says, electricity issues is man made disaster.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      There has been several arguments as to the classification of this type of threat. When it is caused by environmental factors like storms and natural disasters, it could be classified as a natural threat. If the loss affects IT systems' operations, it could be linked to a system threat. However, upon a second review, I agree with you that it is a man-made disaster as it can occur due to infrastructure issues, grid failures or human actions or sabotage.

  • @madz1131
    @madz1131 2 หลายเดือนก่อน

    Q11 whats relation between vendor selection and answer D: data classification?

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Thank you for that observation and apologies for the inconvenience. The correct answer is option A. I have added the EDIT to the video description.

  • @tundeshonubi3255
    @tundeshonubi3255 2 หลายเดือนก่อน

    Thank you very much for your brilliant knowledge of cyber security and these great videos I keep watching your videos and sharing with our class.

  • @tundeshonubi3255
    @tundeshonubi3255 2 หลายเดือนก่อน

    Thank you. You videos are very thorough & easy to assimilate.. I am grateful. I have informed our group to like and subscribe to your channel as we are all getting ready for our Cissp in a few months

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      @tundeshonubi3255 Thank you so much for your kind words and support. You will definitely ace your exam! I look forward to hearing the good news

  • @jaymendioro9469
    @jaymendioro9469 2 หลายเดือนก่อน

    For Q27 I think the answer is A encryption is to hide information from anauthorzed users D is for IDS

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Hello @jaymendioro9469, thank you for the feedback. I actually mentioned that the correct answer is A - To hide information from unauthorized users. Apologies for the typo.

  • @JasonSmith-se1jg
    @JasonSmith-se1jg 2 หลายเดือนก่อน

    the correct answer for question 19 should be b... kerberos is primarily authentication. ldap is commonly used to authenticate users, even though it is not itself an authentication protocol. tls and ssl both offer password as well as client-side certificate authentication as part of the channel creation. oauth on the other hand it authorization only, and the protocol does not specify anything related to authentication. from the oauth website... "OAuth 2.0 was intentionally designed to provide authorization without providing user identity and authentication, as those problems have very different security considerations that don’t necessarily overlap with those of an authorization protocol. "

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Hello @JasonSmith-se1jg, SSL/TLS is used to secure the connection rather than to authenticate users. The other 3 options are commonly used authentication protocols. OAuth is an open standard protocol that allows third-party services to exchange tokens for granting access without exposing user credentials, thus authenticating and authorizing users.

  • @JasonSmith-se1jg
    @JasonSmith-se1jg 2 หลายเดือนก่อน

    question 2 should be c. according to google searches and the official testing guidebook, you don't establish an escrow agreement until the system has been accepted. up until that point you don't know if the system meets your needs and that you will use it, so establishing an escrow agreement at the development stage could result in spending money on escrow that is not needed, as you may need to switch vendors if the system is not acceptable.

  • @JasonSmith-se1jg
    @JasonSmith-se1jg 2 หลายเดือนก่อน

    question 14 should be provenance, not prevenance. the correct answer is not listed.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Apologies for the error. The answer to number 14 is Provenance, so option C

  • @ImEddieful
    @ImEddieful 2 หลายเดือนก่อน

    Gonna start Domain 5 soon, so using your video as prep while on my lunch break :D

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      Glad you found the video helpful

  • @muluhdesmond6888
    @muluhdesmond6888 2 หลายเดือนก่อน

    Great video and well explained

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 2 หลายเดือนก่อน

      @@muluhdesmond6888 thank you for your kind words

  • @adamchisnall5124
    @adamchisnall5124 3 หลายเดือนก่อน

    I don't speak Spanish but could make out what all that was and got all right cool vid wish I knew what that stuff meant tho

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 3 หลายเดือนก่อน

      Hi @adamchisnall5124 You can check out the English version on this link th-cam.com/video/ePRLQZaSvuU/w-d-xo.htmlsi=1H2-OmX6vBQ6Mp0_

  • @user-gd2hh1hm8p
    @user-gd2hh1hm8p 3 หลายเดือนก่อน

    Question 10, shouldn't the answer be D. Identifying the scope and impact of the incidents, which would be carried out by Response Team?

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 3 หลายเดือนก่อน

      Thank you for this feedback. Upon further review, you are correct. The right answer is D - Identifying the scope and impact of the incident. Before any containment, notification, or evidence gathering can occur, it is essential to understand the scope and impact of the incident as this assessment allows the organization to prioritize the response, determine the resources needed, and decide on the most effective containment strategy.

  • @obinnaphilem
    @obinnaphilem 3 หลายเดือนก่อน

    Great job you are doing pls keep it up. However, i think question 8 should be reviewed as Hashing doesn't provide authenticity. The right answer should have been digital signature if it was an option. But pls note that hashing only provide integrity.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 3 หลายเดือนก่อน

      Thank you for the feedback. When answering questions, it is important that you select the BEST answer from the options presented to you. If digital signature were an option, that would have been the BEST answer to the question. However, in this scenario, Hashing is the closest correct answer because it directly refers to the technique used to ensure data integrity

    • @obinnaphilem
      @obinnaphilem 3 หลายเดือนก่อน

      Oh yes you right. I have gone through all your videos and i must give it to you because you did an amazing job. I have gone through several isc2 playlist on TH-cam. certification terminal, infosec, prahb Nair and also completed a certified in cybersecurity course on udemy which i believe covered every concept of each domain. I intend to book and write the exam this month end. This will be my second attempt though as i only depended on isc2 material for my first attempt. I will welcome any recommendations or suggestions because this second attempt i have no options but to pass it 😂

  • @NAGARAJAN-ej4qf
    @NAGARAJAN-ej4qf 3 หลายเดือนก่อน

    Thanks

  • @it-expat-china
    @it-expat-china 3 หลายเดือนก่อน

    For user account provisioning I would argue the process definitely starts (aka initializes) from HR dept

    • @EmryNetworks
      @EmryNetworks 2 หลายเดือนก่อน

      I came here to say the same thing. HR conducts backgrounds, and upon successful completion of the hiring process, initializes the provisioning of an account by sending the request to the IT department. When employment is terminated, HR sends the deprovisioning request to IT. I think this question is the prime example of "think like a manager" and not apply the technical lens. I have heard over and over again that the CISSP is about a managerial mindset and not technical.

  • @thandekambonambi5007
    @thandekambonambi5007 3 หลายเดือนก่อน

    Thank you very much love this

  • @cynthiading1348
    @cynthiading1348 3 หลายเดือนก่อน

    your videos are great. the only issue was the colors you chose. the blue is too light and makes me squint to see the words properly. it would have been better if dark blue was used throughout. my eyes are very sensitive to light so watching the video and reading the questions gave me a headache. thanks in advance.

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 3 หลายเดือนก่อน

      @cynthiading1348 thank you for the feedback. I did note that issue and started using a darker background in the videos for Domain 3 - 5. Apologies for the inconvenience.

  • @niphozulu27
    @niphozulu27 3 หลายเดือนก่อน

    I am an ametuer and want to get into the IT space. I have done a linux course I am now studying for a CompTIA A+ exam. Wanted to ask if the compTIA certification is enough to get me into the door of the IT world?

    • @ChinwenduOkongwu
      @ChinwenduOkongwu 3 หลายเดือนก่อน

      The CompTIA A+ is a good place to start for entry-level positions. You can also take the ISC2 Certified in Cybersecurity Certification, which is offered by the ISC2 for free. I have prepared videos on that which you can also watch to help you pass the exam on the first try.