Тёмный
No video :(

Tips & Tricks: CISM Exam Cheat Sheet - Pass It on the First Attempt! 

Semi Yulianto
Подписаться 23 тыс.
Просмотров 10 тыс.
50% 1

Опубликовано:

 

26 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 33   
@gayansahabandu2799
@gayansahabandu2799 3 года назад
in Question 1 it says most effective way to preventing a weakness from being "introduced"; what patch management would do is plugging weaknesses already operational inside your system. i.e. you would run a win 2018 server and latest patch update or hot fix would patch the weakness already inside that server (which has been already exploited by the hackers now Microsoft has plugged that gap). meaning without that patch, server would run with that weakness in place, hence weakness is already introduced / existing. effective Change management on the other hand would check potential weakness can introduce as a result of new proposed changes. i.e. if the latest proposed change to your file server requires to use SMB version 1, an effective change management system would detect this and prevent it from applying those new changes hence, it has prevented a new weakness being "introduced" into the existing production system.
@dxbtalal
@dxbtalal 2 года назад
yes really one of the worst video.. in start it like shit shit.. but thats okey but 1st question answer is worng. and i jsut stoped it... don't watch it.. title should be how to fail in cism exam
@olublessed3044
@olublessed3044 2 года назад
I agree with your answer. The key word there is "weakness being introduced into an existing" system and that comes through set of changes which would be properly detected through change mgt. Patch is for "weakness already within the system" NOT being introduced.
@dinesh2386
@dinesh2386 2 года назад
Answer for Q1 is B: Change Management. Source: official ISACA Q&A
@borufkaz
@borufkaz Год назад
yes. this was my choice too :D
@justindelpero
@justindelpero Год назад
Thank you, was worried I'd lost my mind.
@briancook6158
@briancook6158 Год назад
I disagree with number 7. The first thing you do with an infected machine is to get it off the network asap. Then you make a copy of it for potential litigation and criminal investigation. Then you rebuild it but you have to determine how it got hacked so it doesn’t just happen again.
@cabraldegah6997
@cabraldegah6997 7 месяцев назад
Not, he’s right: Disconnecting the mail server from the network is an initial step, but does not guarantee security. Rebuilding the system from the original installation medium is the only way to ensure all security vulnerabilities and potential stealth malicious programs have been destroyed. 😊
@briancook6158
@briancook6158 7 месяцев назад
Okay and while you are brainstorming how you're going to rebuild it the attacker is moving laterally across the network and escalating privs.
@itgma_keithape
@itgma_keithape 4 месяца назад
Official answer to Question 1 is Change Management according to the QAE book. “Patch management involves the correction of software weaknesses and would necessarily follow change management procedures. Change management controls the process of introducing changes to systems and controlling unauthorized changes to production, which are often the points at which weaknesses will be introduced.”
@cabraldegah6997
@cabraldegah6997 7 месяцев назад
I disagree with Q1, the right answer isn’t patch management, is B which is change management. Change management controls the process of introducing changes to systems. This is often the point at which a weakness will be introduced. Patch management involves the correction of software weaknesses and would necessarily follow change management procedures.
@itgma_keithape
@itgma_keithape 4 месяца назад
You’re correct. Official answer in the QAE is change management. “Patch management involves the correction of software weaknesses and would necessarily follow change management procedures. Change management controls the process of introducing changes to systems and controlling unauthorized changes to production, which are often the points at which weaknesses will be introduced.”
@showniels
@showniels 3 года назад
Your answer on question 1 is definitely wrong :)
@blaisentwali2679
@blaisentwali2679 2 года назад
The answer should be B: Change Management.
@dxbtalal
@dxbtalal 2 года назад
@@blaisentwali2679 just reached to q4.. that is also wrong
@borufkaz
@borufkaz Год назад
@@dxbtalal should be about resesigning right?
@gayansahabandu2799
@gayansahabandu2799 3 года назад
Hi in Question 8 even though security best practice answer would be number of admins, in practical world, if you are using WEP encryption with short short bit rate would always guarantee your wifi getting hacked by a wifi hacking tool. Please do a research and see how many tools that you can find to crack a WEP wifi system, its so easy. So, it doesn't matter if you have only one or 10 admins with weak or strong passwords. If I am a hacker, if my initial scan finds WEP being used on your wifi, I would not bother go after the admin password at all. Answer B says number of administrators it doesn't say password strength of the administrators. so you could have 100 administrators but what if they all are using good passwords. in hacker's point of view, in a wifi, unlike trying to hack a system or a website, initial wifi scan would reveal the type of encryption it uses hence if WEP is used, its very easy to hack and guaranteed and it takes less time than going after a brute force attack on admin's password.
@kssaz3578
@kssaz3578 3 года назад
good and sincere advise - more question would have been good...!
@modar30
@modar30 3 года назад
I agree... The answer should be b. Change management..... But if isaca meant vulnerabilities by 'weaknesses ' then ya it is patch mngmnt
@rizki6271
@rizki6271 3 года назад
Thanks pak semi, sangat bermanfaat sekali :)
@HarryPotter-li3hs
@HarryPotter-li3hs 3 года назад
Pak request tutorial video forensik web pesan instan menggunakan Autopsy. Terimakasih
@amarullohripai3745
@amarullohripai3745 3 года назад
Sundul gan
@Bob-hk9mx
@Bob-hk9mx 3 года назад
Please made video on ecptxV2 exam guide.
@SemiYulianto
@SemiYulianto 3 года назад
OK, perhaps next time 😁
@VIJAYVASOYA
@VIJAYVASOYA 3 года назад
Thank You
@SemiYulianto
@SemiYulianto 3 года назад
ur welcome :)
@andyas7957
@andyas7957 3 года назад
thanks pak Semi...
@SemiYulianto
@SemiYulianto 3 года назад
Sama" mas :)
@briancook6158
@briancook6158 Год назад
I also disagree with number 8. I’d rather have ten admins running WPA2 then one admin running WEP.
@Kendysukardi
@Kendysukardi 2 года назад
Thanks pak
@mauztest2450
@mauztest2450 Год назад
Can you please add mode adds between the questions?😂
@muhammadarkarrozi2961
@muhammadarkarrozi2961 3 года назад
Pak coba bahas cara pake skipfish:)
@peptechtalks
@peptechtalks 11 месяцев назад
Humble request please do not share wrong answers as this misguides and discourages students. The Q1 answer mentions "MOST" as the keyword which means it must be a regular practice. Also Change management is a preventive control and detective control so this makes more close to be the correct answer.