ISC2 CC Domain 2 :Business Continuity, Disaster Recovery, and Incident Response

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ก.พ. 2025

ความคิดเห็น • 92

  • @elijahlasisi6105
    @elijahlasisi6105 ปีที่แล้ว +16

    I finished the exam in less than an hr and I passed . Thanks to you guys .. BIG UPS !! GOD BLESS YOU

    • @Gaby-cq8pr
      @Gaby-cq8pr 10 หลายเดือนก่อน +1

      What else did you study to pass it?

  • @seanrivers4667
    @seanrivers4667 ปีที่แล้ว +41

    Q27 @ 20:34 she says option (C) when she meant to say say (B) after clearly making B as the right answer.
    What is the difference between business continuity planning and disaster recovery planning?
    a. Business continuity planning is about restoring IT and communications back to full operations after a disruption, while disaster recovery planning is about maintaining critical business functions
    b. Disaster recovery planning is about restoring IT and communications back to full operations after a disruption, while business continuity plan is about maintaining critical business functions.
    c. Business continuity planning and disaster recovery planning are the same thing.
    d. Business continuity planning is about maintaining critical business functions before a disaster occurs.

    • @miguelcontreras4255
      @miguelcontreras4255 ปีที่แล้ว +3

      Yes, option b is right, there ir an error in this question

    • @EngageandEvolve
      @EngageandEvolve หลายเดือนก่อน

      Thanks a million I am a noobie here! Thanks bruvva

  • @mauricioarizaca801
    @mauricioarizaca801 ปีที่แล้ว +2

    Hello I've just noticed your video and your channel, I'm looking forward to see the rest of questions Domains, are very helpfull to test my knowledge of what I studied, thanks again for your dedication of doing these videos. Please give us more ❤🤗

  • @benny6466
    @benny6466 ปีที่แล้ว +16

    im not sure how accurate these answers are. throughout the video there are times where "breach" is the right answer but it says "intrusion". correct me if I'm wrong but if data is successfully stolen then an intrusion becomes a breach.

    • @jasshan2107
      @jasshan2107 11 หลายเดือนก่อน +1

      Yup, I noticed the same

    • @hackwithspeck
      @hackwithspeck 10 หลายเดือนก่อน

      I noticed also, i was like am i not sound. Sometimes it's because we don't believe ourselves. But i know some of my answers are correct and theirs are wrong.

    • @adowali3671
      @adowali3671 10 หลายเดือนก่อน +1

      I agree with you and was totally confused myself whether I would consume those type of responses. Thanks for realizing that too!

  • @imtiazahmed7393
    @imtiazahmed7393 ปีที่แล้ว +1

    It is really very helps full for verifying my knowledge and improving the concept of this domain i will be very appreciative and thankful if you create it for all domains ISc and ISACA as well. Really a great job done by you. 100/100

    • @CyberNauts
      @CyberNauts  ปีที่แล้ว

      Glad to hear that :) Thank you

  • @KetsoLife
    @KetsoLife ปีที่แล้ว +2

    This Domain 2 is difficult for me as im still makig mistakes , Thank you very much I will keep on repeating im learning a lot .with my IT 10byears experience im embarrased to say im still mixing the jargon.

  • @kebrarawtube
    @kebrarawtube 10 หลายเดือนก่อน +3

    Question 27 at 20:32 I think the correct answer is B.

  • @ivanvincentborgonos3058
    @ivanvincentborgonos3058 ปีที่แล้ว +7

    one item is incorrect. :) you said the answer is C but highlighted B. But B is the correct answer. question 27

  • @BAEESCOPE2010
    @BAEESCOPE2010 9 หลายเดือนก่อน +3

    The explanation part repeats the answer agin. So what's the point? You can add more questions and forget about the explanation as we can read it from the book. It will add more questions and will be more useful. Also if the errors can be rectified that would be great. But anyway the videos are very helpful. Thank you.

  • @prabhbrar7636
    @prabhbrar7636 2 หลายเดือนก่อน

    q16 . right answer is a not b , a power outage that causes major disruption in a company’s operations, the appropriate plan to restore normal operations would be a Disaster Recovery Plan (DRP), not a Business Continuity Plan (BCP).

  • @AhmedHassan-rg2oq
    @AhmedHassan-rg2oq ปีที่แล้ว +2

    Very informative! This quiz helped me to clear my confusion! Kindly upload more quiz on further domains .

  • @auracle_illusionist
    @auracle_illusionist ปีที่แล้ว +2

    Question 41: immediate response procedures and checklists is a component of Business continuity plan. How come the answer is a? Incident response plan?

    • @jasmeetsaini5276
      @jasmeetsaini5276 ปีที่แล้ว +3

      I think answer is BCP, let me know too the correct answer

  • @GageOlsonCybersecurity
    @GageOlsonCybersecurity ปีที่แล้ว +2

    Question 9: I feel should have been Breach. Intrusion focuses more on gaining access, vs breach is gaining access and stealing files. Thoughts?

    • @rezboyd
      @rezboyd ปีที่แล้ว

      same goes to Q14 right

    • @aiswaryaraju4814
      @aiswaryaraju4814 10 หลายเดือนก่อน

      @@rezboyd agree

    • @adebukolaadelakun9934
      @adebukolaadelakun9934 12 วันที่ผ่านมา

      I feel breach is the right answer too

  • @muhammadyounas6437
    @muhammadyounas6437 ปีที่แล้ว +3

    Really appreciated !
    I have cleared my all concepts regarding domain 2 .please make video on further remaining domains soon. My exam is coming on 15 September.

    • @CyberNauts
      @CyberNauts  ปีที่แล้ว +1

      All domains will be posted before next week hopefully

    • @led8229
      @led8229 ปีที่แล้ว +1

      @@CyberNauts Thanks! I have my exam in June 19th!

    • @nawazsherif4276
      @nawazsherif4276 ปีที่แล้ว +1

      @@led8229 Same I too have my exam in June 19th. Can you pls share me the exam material if you have.

    • @zubskitchenplug
      @zubskitchenplug ปีที่แล้ว +1

      @@nawazsherif4276how was the exam

    • @sheikhsadiq7057
      @sheikhsadiq7057 ปีที่แล้ว +1

      Tomorrow my exam

  • @ILoveFiberGlass
    @ILoveFiberGlass ปีที่แล้ว +4

    In Q9 is Breach and Intrusion not the same thing?

    • @Allistar08
      @Allistar08 10 หลายเดือนก่อน +4

      Funny you mention those so look at it this way.
      Breach - Internal (Employee) unauthorized access
      Intrusion - External (hacker) unauthorized access
      Exploit - External (hacker) deliberate attack
      Hope this helps.

    • @kelvinjacobmarcar4793
      @kelvinjacobmarcar4793 10 หลายเดือนก่อน +2

      while an intrusion involves any unauthorized access attempt, a breach specifically refers to the successful unauthorized access to a system or data. A breach is a type of intrusion, but not all intrusions result in a breach.

  • @ethiopiainstituteforeconom1454
    @ethiopiainstituteforeconom1454 9 หลายเดือนก่อน

    You’re the best!

  • @davidgory5812
    @davidgory5812 ปีที่แล้ว +2

    Can someone explain how number 9 is intrusion, but number 14 is breach?

    • @CyberNauts
      @CyberNauts  ปีที่แล้ว +5

      9 asks for defining situation/activity, an intrusion, and 14 is the type of incident. Intrusion is an unlawful activity which results in a breach.

    • @davidgory5812
      @davidgory5812 ปีที่แล้ว +1

      @@CyberNauts thank you

  • @LordFingers
    @LordFingers ปีที่แล้ว

    I think the answer to QUESTION 9 should be A.
    A security incident refers to a violation of a company’s security policy. On the other hand, a security breach is when an unauthorized actor gains access to data, applications, network or devices which results in information being stolen or leaked

    • @Allistar08
      @Allistar08 10 หลายเดือนก่อน +3

      Funny you mention those so look at it this way.
      Breach - Internal (Employee) unauthorized access
      Intrusion - External (hacker) unauthorized access
      Exploit - External (hacker) deliberate attack
      Hope this helps.

  • @bvwproductions
    @bvwproductions ปีที่แล้ว +7

    Again question 41. It should be BCP - at this point I stopped watching this video, because this is confusing me to what I have learned from the study material. NO offence though, but this does not seem to be relevant.

    • @anthonytaylor5910
      @anthonytaylor5910 ปีที่แล้ว +3

      I agree. I just looked at the notes I took from the ISC study material and its definitely BCP. 🤔🤔

    • @bvwproductions
      @bvwproductions ปีที่แล้ว +1

      @@anthonytaylor5910 Just read study material and google few topics for clarification if required instead of looking on such question sets. This will confuse you more. If concepts are clear you will definitely pass the exam. All the best!!

    • @anthonytaylor5910
      @anthonytaylor5910 ปีที่แล้ว +1

      @@bvwproductions thank you sir yeah my exam is scheduled for Aug 10th. Definitely will just refer to the study materials and Google.

    • @femimelord1606
      @femimelord1606 ปีที่แล้ว +2

      Exactly. And Question 54 confirms that too.

    • @mohammadasadansari3853
      @mohammadasadansari3853 ปีที่แล้ว

      ​@@anthonytaylor5910I am also appearing on 10 aug for exam

  • @alaaap4718
    @alaaap4718 ปีที่แล้ว +1

    Are u sure with 9 . It says the data is already compromised so that means breach

    • @hackwithspeck
      @hackwithspeck 10 หลายเดือนก่อน

      I Was worried honestly.

  • @bvwproductions
    @bvwproductions ปีที่แล้ว +1

    I think there is some kind of discrepancies in your answers. Q.23 - as per the ISC2 material the answer should be Adverse Events and not incidents. If not, please explain.

    • @AbhishekKumar-id3yz
      @AbhishekKumar-id3yz ปีที่แล้ว +4

      No, the answer is Incident because incident means an unplanned event that could have a negative impact on an organization. And here, system crash is an unplanned event.

    • @auracle_illusionist
      @auracle_illusionist ปีที่แล้ว +1

      Incident “BEST” describes that scenario

    • @NourishFitLife
      @NourishFitLife ปีที่แล้ว +2

      you are right it adverse event as per ISC2 chapter 2 see below
      Chapter Terms and Definitions
      Adverse Events
      Events with a negative consequence, such as system crashes, network packet floods, unauthorized
      use of system privileges, defacement of a web page or execution of malicious code that destroys
      data.

    • @prateekmittal6240
      @prateekmittal6240 4 หลายเดือนก่อน

      @@NourishFitLife Yes. You're right. As per ISC2 Official CC training, it should be adverse event.

  • @saglamairdropstrongairdrop495
    @saglamairdropstrongairdrop495 5 หลายเดือนก่อน

    can anyone explain between difference question 15-16

  • @vishals7736
    @vishals7736 ปีที่แล้ว +2

    Expecting more such videos in QuickTime

  • @sanjaybhatt1982
    @sanjaybhatt1982 ปีที่แล้ว +1

    Q23. The Answer is A as it has negative consequences of the event

  • @faizanking-i4e
    @faizanking-i4e ปีที่แล้ว +3

    Thanks Dear FOr this video , kindly make all 3 remaining domains so that i can pass my exams before 15th

  • @Publius_Valerius
    @Publius_Valerius ปีที่แล้ว +5

    Who chose the sultry intimate voice for this video?

  • @NanaAkuaSerwaa-y5u
    @NanaAkuaSerwaa-y5u ปีที่แล้ว

    I want to understand how and why the answer to number 38 is not C but B.

    • @auracle_illusionist
      @auracle_illusionist ปีที่แล้ว +1

      Option C is too specific. A typical IR plan involves appropriate representatives across the organization.

    • @joelam4362
      @joelam4362 ปีที่แล้ว

      @@auracle_illusionist Why not B & C ?

    • @joelam4362
      @joelam4362 ปีที่แล้ว +1

      A typical incident response team is a cross-functional group of individuals who represent the management, technical and functional areas of responsibility most directly impacted by a security incident. Potential team members include the following:
      Representative(s) of senior management
      Information security professionals
      Legal representatives
      Public affairs/communications representatives
      Engineering representatives (system and network)

    • @onurhanyalcn6524
      @onurhanyalcn6524 ปีที่แล้ว

      @@joelam4362 isn't funny these ppl don't know whats going on in IT and still representing us

  • @franklinselvaraj9712
    @franklinselvaraj9712 ปีที่แล้ว +9

    Question 15 : How come IT outage become Disaster Recovery Plan ?. Isn't part of Business Continuity ?

    • @hackwithspeck
      @hackwithspeck 10 หลายเดือนก่อน

      They'll need to resume from the last known successful state. Thats why it's Disaster recovery.

    • @ubi-wan-kenobi
      @ubi-wan-kenobi 5 หลายเดือนก่อน

      Disaster recovery has to do with It operations and getting it back on partial or full operation

  • @ireneamong1791
    @ireneamong1791 ปีที่แล้ว

    Qn. 27, answer is B.

  • @priyaiyer9804
    @priyaiyer9804 ปีที่แล้ว

    Q48 doesn't seem to be right as per your explanation..

  • @frederickfajardo6807
    @frederickfajardo6807 ปีที่แล้ว

    Question 35 the written question is different from the audio 😅

  • @girishkumararavalli8091
    @girishkumararavalli8091 ปีที่แล้ว

    Hi please re-look the answer of 27th question in the 5 th video (I e BC DR IR chapter)

    • @Ashtapathyps
      @Ashtapathyps 10 หลายเดือนก่อน

      The right ans is option B

  • @solzzzy
    @solzzzy ปีที่แล้ว +1

    some mistakes noticed, look at Q. 27

  • @siviweflatela3090
    @siviweflatela3090 7 หลายเดือนก่อน

    Question 23 is wrong the answer is A

  • @joelam4362
    @joelam4362 ปีที่แล้ว +1

    Q34 should be "Security Operations Center Team or SOC Team" instead of just "Security Operations Center"

  • @abquickfixstudio2366
    @abquickfixstudio2366 8 หลายเดือนก่อน

    Answer for question 38 should be D

  • @augustineagyapong6561
    @augustineagyapong6561 9 หลายเดือนก่อน

    Question 20 is C

    • @ubi-wan-kenobi
      @ubi-wan-kenobi 5 หลายเดือนก่อน

      Thank you. Finally.
      I’m not gonna be confused on something i spent a whole day dedicating to grasping

  • @Hmanthedude
    @Hmanthedude ปีที่แล้ว

    How are questions 9 and 14 different answers? Nuts.

    • @Allistar08
      @Allistar08 10 หลายเดือนก่อน

      Funny you mention those so look at it this way.
      Breach - Internal (Employee) unauthorized access
      Intrusion - External (hacker) unauthorized access
      Exploit - External (hacker) deliberate attack
      Hope this helps.

  • @sazzadhossainnayem3073
    @sazzadhossainnayem3073 5 หลายเดือนก่อน

    Answer 9 will be breach. not intrusion.

  • @ahmedagamaliyev1798
    @ahmedagamaliyev1798 10 หลายเดือนก่อน

    q 54 answer should be d

  • @vuyogcanga9665
    @vuyogcanga9665 4 หลายเดือนก่อน

    Material is outdated. Wrote my exam and non of these were there. Make sure to study first. 😉

  • @aioVPM
    @aioVPM ปีที่แล้ว

    question 27 answer mismatch

  • @TcsMsbi
    @TcsMsbi ปีที่แล้ว

    Q:6 wrong

  • @alaaap4718
    @alaaap4718 ปีที่แล้ว

    Men. The answer for question 30 is D. The disaster is still goin on. Its main goal is to ensure that all people in the facility is safe by guiding the erp

  • @abquickfixstudio2366
    @abquickfixstudio2366 8 หลายเดือนก่อน

    I think this content is AI generated that is why so many mistakes, I have doubt on some ques and verify them with ChatGpt and it shows the same answer what GPt answer😂

  • @alaaap4718
    @alaaap4718 ปีที่แล้ว

    Lol at 27.

  • @revolutionsady1
    @revolutionsady1 6 หลายเดือนก่อน

    Q.54 answer is D, instead of C, checked with isc2