Search results

  1. Trevor Chandler

    RSA Encryption

    RSA encryption is still part of the team roster, but it's getting on in age. What's the up-and-coming successor to this once-upon-a-time perennial all-star? If you do provide a response to this query, some evidence to support your input would be most appreciated. Opinions and feelings don't...
  2. Trevor Chandler

    ECDHE_ECDSA vs RSA

    Okay, here's my second question in this latest series: Question: Why is using ECDHE_ECDSA stronger than using RSA? A. ECDHE_ECDSA provides both data authenticity and confidentiality. B. ECDHE_ECDSA uses a pseudorandom function to generate the keying materials. C. If the server's...
  3. Trevor Chandler

    Malware on Windows system

    Question: Why is malware that runs as a Windows service more difficult for the average end user to detect? Choices: A. Because services run in the User mode B. Because services run in the background and do not interact with the users C. Because all services run automatically when the...
  4. Trevor Chandler

    Most "Effective" Cybersecurity Defense

    What do you think is the most effective Cybersecurity Defense? 1. MFA 2. Continuous Monitoring 3. Security Awareness Training 4. Encryption
  5. Trevor Chandler

    Phishing

    Wow! Insane numbers!!! It appears to me that the underground (aka hackers) know something that the rest of us don't.. I'm just sayin'!
  6. Trevor Chandler

    InfoSec Quiz Question 4

    Which type of password attack makes use of extensive wordlists to hash and run against a captured password hash? A. Character B. Brute Force C. Rainbow Tables D. Dictionary
  7. Trevor Chandler

    InfoSec Quiz Question 3

    What is the command to launch METASPLOIT ? A. Msconsole B. Msfconsole C. Msadmin D. Msfadmin
  8. Trevor Chandler

    InfoSec Quiz Question - 2

    Which of the following refers to an attacker exploiting vulnerabilities before the vendor has a patch or mitigation for them? A. Day 1 attack B. Zero-day attack C. Exploit D. Category I attack Note: Consulting any additional resources constitutes a lack of integrity...
  9. Trevor Chandler

    InfoSec Quiz Question

    Malicious software collecting information about users without their knowledge/consent is known as A. Crypto-malware B. Ransomware C. Adware D. Spyware Note: Use of a search engine, or any other resources is prohibited!!!
  10. Trevor Chandler

    Identity and Access Management (IAM): Agree or Disagree?????

    I'm going to make some statements, and I would like for you to simply indicate whether you AGREE or DISAGREE. If you AGREE, keep it movin'. If you DISAGREE, share with me why, if you don't mind. If you neither AGREE or DISAGREE, you can indicate that you have no opinion (or none of my business...
  11. Trevor Chandler

    Types of Cyber-Attacks

  12. Trevor Chandler

    Why is there a new version of Security+?

    And the answer can be found at s.comptia.org/3tcAmzh
  13. Trevor Chandler

    Cyber Security vs Information Security

    https://pbs.twimg.com/media/F6dMkW1WsAAbBam?format=jpg&name=900x900
  14. Trevor Chandler

    CIN TTT Security+

    Hello community members, When does the Security+ TTT series begin? I thought it was scheduled to begin 9/19/2023. If so, some how I didn't register. May I get someone to direct me to the registration link. Thanks.
  15. Trevor Chandler

    Project+ TTT

    Yesterday, Wednesday, Nov. 9, 2022, was the final session for the Project+ Train-the-Trainer. Each session was masterfully delivered by the 2022 CompTIA Instructor of the Year, Mr. Rick Butler. I would like to publicly thank Mr. Rick Butler for 8 superb sessions, that allowed all attendees...
  16. Trevor Chandler

    Disregard

    Happy Sunday!!! My condolences to the Philadelphia Phillies :-( Better luck next time.
  17. Trevor Chandler

    Linux+ Sample Question

    Q. You need to modify the PATH element in the /etc/profile file. Which of the following options is the BEST choice to do so? A. vi /etc/profile B. cat /etc/profile C. grep ‘PATH’ /etc/profile D. head -n 25 /etc/profile No Googling!!!!!!!!!!!!!