Cyber_Racheal (@cyberracheal) 's Twitter Profile
Cyber_Racheal

@cyberracheal

|| Cybersecurity and Cloud Instructor || CyberGirlie || Program Coordinator || WiCys West Africa ||Security Awareness Coach

ID: 1083129829766168586

linkhttps://www.linkedin.com/in/racheal-popoola?utm_source=share&utm_campaign=share_ calendar_today09-01-2019 22:34:09

2,2K Tweet

4,4K Followers

509 Following

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

ISO 27002 is a supplementary standard aimed at guiding implementation controls in order to maintain security controls for Information Security Management Systems (ISMS), as defined in ISO 27001. A. ISMS✅

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Which of these is a type of corrective security control? A. Intrusion detection systems B. Encryption C. Patches D. Guidelines

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

It gets to a point where you answer yourself while trying to get an AI prompt 😂. Tell me why I have over 300 words as prompt and I’m still typing 💬.

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

3 learners of mine will take their AWS Cloud practitioner exams tomorrow. The 40+ others will take next week. After prepping for 3 months. To the pace setters, I wish you guys the very best.

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Patches are a type of corrective security control, since they repair damage and restore resources and capabilities to a secure and previously-updated state. C. Patches ✅

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Which of these attacks take advantage of inadequate input validation in websites? A. Phishing B. Trojans C. Cross-Site Scripting D. Rootkits

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Doing a major update when you know people will write exams is just out of place. People take time off work to write exams, people have things to do. At 10am, people still haven’t been able to write for an exam schedule for 8am? Really bad.

Confidence Staveley (@sisinerdtweets) 's Twitter Profile Photo

The AI Cyber Magazine Summer issue is live! Read and download it issuu.com/aicybermagazin… A cover interview with Diana Kelley, Protect AI's CISO and a special feature of Michael Beck, Global CISO at Darktrace, guarantees you'll have a better understanding of how AI is shaping the

The <a href="/aicybermagazine/">AI Cyber Magazine</a> Summer issue is live! Read and download it issuu.com/aicybermagazin…

A cover interview with Diana Kelley, Protect AI's CISO and a special feature of Michael Beck, Global CISO at Darktrace, guarantees you'll have a better understanding of how AI is shaping the
Confidence Staveley (@sisinerdtweets) 's Twitter Profile Photo

123 pages is no joke! Best part, it’s FREE to download the digital version published few hours ago. issuu.com/aicybermagazin… I’m not surprised powerful reviews like this one below👇🏽 are already coming in dance! #WorldClassOrNothing

123 pages is no joke!

Best part, it’s FREE to download the digital version published few hours ago. issuu.com/aicybermagazin…

I’m not surprised powerful reviews like this one below👇🏽 are already coming in dance!

#WorldClassOrNothing
Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Which type of attack attempts to gain information by observing the device's power consumption? A. Side Channels B. Trojans C. Cross Site Scripting D. Denial of Service

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

A. A side-channel attack is a passive and non-invasive attack aiming to extract information from a running system, by using special-purpose hardware to perform power monitoring, as well as timing and fault analysis attacks. ✅

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Which of the following attacks take advantage of poor input validation in websites? A. Cross-Site Scripting B. Rootkits C. Phishing D. Trojans