Q27 @ 20:34 she says option (C) when she meant to say say (B) after clearly making B as the right answer. What is the difference between business continuity planning and disaster recovery planning? a. Business continuity planning is about restoring IT and communications back to full operations after a disruption, while disaster recovery planning is about maintaining critical business functions b. Disaster recovery planning is about restoring IT and communications back to full operations after a disruption, while business continuity plan is about maintaining critical business functions. c. Business continuity planning and disaster recovery planning are the same thing. d. Business continuity planning is about maintaining critical business functions before a disaster occurs.
im not sure how accurate these answers are. throughout the video there are times where "breach" is the right answer but it says "intrusion". correct me if I'm wrong but if data is successfully stolen then an intrusion becomes a breach.
I noticed also, i was like am i not sound. Sometimes it's because we don't believe ourselves. But i know some of my answers are correct and theirs are wrong.
Hello I've just noticed your video and your channel, I'm looking forward to see the rest of questions Domains, are very helpfull to test my knowledge of what I studied, thanks again for your dedication of doing these videos. Please give us more ❤🤗
This Domain 2 is difficult for me as im still makig mistakes , Thank you very much I will keep on repeating im learning a lot .with my IT 10byears experience im embarrased to say im still mixing the jargon.
It is really very helps full for verifying my knowledge and improving the concept of this domain i will be very appreciative and thankful if you create it for all domains ISc and ISACA as well. Really a great job done by you. 100/100
The explanation part repeats the answer agin. So what's the point? You can add more questions and forget about the explanation as we can read it from the book. It will add more questions and will be more useful. Also if the errors can be rectified that would be great. But anyway the videos are very helpful. Thank you.
q16 . right answer is a not b , a power outage that causes major disruption in a company’s operations, the appropriate plan to restore normal operations would be a Disaster Recovery Plan (DRP), not a Business Continuity Plan (BCP).
Question 41: immediate response procedures and checklists is a component of Business continuity plan. How come the answer is a? Incident response plan?
Funny you mention those so look at it this way. Breach - Internal (Employee) unauthorized access Intrusion - External (hacker) unauthorized access Exploit - External (hacker) deliberate attack Hope this helps.
while an intrusion involves any unauthorized access attempt, a breach specifically refers to the successful unauthorized access to a system or data. A breach is a type of intrusion, but not all intrusions result in a breach.
Really appreciated ! I have cleared my all concepts regarding domain 2 .please make video on further remaining domains soon. My exam is coming on 15 September.
Again question 41. It should be BCP - at this point I stopped watching this video, because this is confusing me to what I have learned from the study material. NO offence though, but this does not seem to be relevant.
@@anthonytaylor5910 Just read study material and google few topics for clarification if required instead of looking on such question sets. This will confuse you more. If concepts are clear you will definitely pass the exam. All the best!!
I think the answer to QUESTION 9 should be A. A security incident refers to a violation of a company’s security policy. On the other hand, a security breach is when an unauthorized actor gains access to data, applications, network or devices which results in information being stolen or leaked
Funny you mention those so look at it this way. Breach - Internal (Employee) unauthorized access Intrusion - External (hacker) unauthorized access Exploit - External (hacker) deliberate attack Hope this helps.
I think there is some kind of discrepancies in your answers. Q.23 - as per the ISC2 material the answer should be Adverse Events and not incidents. If not, please explain.
No, the answer is Incident because incident means an unplanned event that could have a negative impact on an organization. And here, system crash is an unplanned event.
you are right it adverse event as per ISC2 chapter 2 see below Chapter Terms and Definitions Adverse Events Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.
A typical incident response team is a cross-functional group of individuals who represent the management, technical and functional areas of responsibility most directly impacted by a security incident. Potential team members include the following: Representative(s) of senior management Information security professionals Legal representatives Public affairs/communications representatives Engineering representatives (system and network)
Funny you mention those so look at it this way. Breach - Internal (Employee) unauthorized access Intrusion - External (hacker) unauthorized access Exploit - External (hacker) deliberate attack Hope this helps.
Men. The answer for question 30 is D. The disaster is still goin on. Its main goal is to ensure that all people in the facility is safe by guiding the erp
I think this content is AI generated that is why so many mistakes, I have doubt on some ques and verify them with ChatGpt and it shows the same answer what GPt answer😂
Q27 @ 20:34 she says option (C) when she meant to say say (B) after clearly making B as the right answer.
What is the difference between business continuity planning and disaster recovery planning?
a. Business continuity planning is about restoring IT and communications back to full operations after a disruption, while disaster recovery planning is about maintaining critical business functions
b. Disaster recovery planning is about restoring IT and communications back to full operations after a disruption, while business continuity plan is about maintaining critical business functions.
c. Business continuity planning and disaster recovery planning are the same thing.
d. Business continuity planning is about maintaining critical business functions before a disaster occurs.
Yes, option b is right, there ir an error in this question
Thanks a million I am a noobie here! Thanks bruvva
I finished the exam in less than an hr and I passed . Thanks to you guys .. BIG UPS !! GOD BLESS YOU
What else did you study to pass it?
im not sure how accurate these answers are. throughout the video there are times where "breach" is the right answer but it says "intrusion". correct me if I'm wrong but if data is successfully stolen then an intrusion becomes a breach.
Yup, I noticed the same
I noticed also, i was like am i not sound. Sometimes it's because we don't believe ourselves. But i know some of my answers are correct and theirs are wrong.
I agree with you and was totally confused myself whether I would consume those type of responses. Thanks for realizing that too!
i also feel same way.some of these stuffs be confusing you moree
Hello I've just noticed your video and your channel, I'm looking forward to see the rest of questions Domains, are very helpfull to test my knowledge of what I studied, thanks again for your dedication of doing these videos. Please give us more ❤🤗
one item is incorrect. :) you said the answer is C but highlighted B. But B is the correct answer. question 27
This Domain 2 is difficult for me as im still makig mistakes , Thank you very much I will keep on repeating im learning a lot .with my IT 10byears experience im embarrased to say im still mixing the jargon.
Question 27 at 20:32 I think the correct answer is B.
It is really very helps full for verifying my knowledge and improving the concept of this domain i will be very appreciative and thankful if you create it for all domains ISc and ISACA as well. Really a great job done by you. 100/100
Glad to hear that :) Thank you
The explanation part repeats the answer agin. So what's the point? You can add more questions and forget about the explanation as we can read it from the book. It will add more questions and will be more useful. Also if the errors can be rectified that would be great. But anyway the videos are very helpful. Thank you.
Question 15 : How come IT outage become Disaster Recovery Plan ?. Isn't part of Business Continuity ?
They'll need to resume from the last known successful state. Thats why it's Disaster recovery.
Disaster recovery has to do with It operations and getting it back on partial or full operation
q16 . right answer is a not b , a power outage that causes major disruption in a company’s operations, the appropriate plan to restore normal operations would be a Disaster Recovery Plan (DRP), not a Business Continuity Plan (BCP).
Question 41: immediate response procedures and checklists is a component of Business continuity plan. How come the answer is a? Incident response plan?
I think answer is BCP, let me know too the correct answer
Who chose the sultry intimate voice for this video?
🤣🤣🤣
In Q9 is Breach and Intrusion not the same thing?
Funny you mention those so look at it this way.
Breach - Internal (Employee) unauthorized access
Intrusion - External (hacker) unauthorized access
Exploit - External (hacker) deliberate attack
Hope this helps.
while an intrusion involves any unauthorized access attempt, a breach specifically refers to the successful unauthorized access to a system or data. A breach is a type of intrusion, but not all intrusions result in a breach.
Very informative! This quiz helped me to clear my confusion! Kindly upload more quiz on further domains .
Question 9: I feel should have been Breach. Intrusion focuses more on gaining access, vs breach is gaining access and stealing files. Thoughts?
same goes to Q14 right
@@rezboyd agree
Can someone explain how number 9 is intrusion, but number 14 is breach?
9 asks for defining situation/activity, an intrusion, and 14 is the type of incident. Intrusion is an unlawful activity which results in a breach.
@@CyberNauts thank you
You’re the best!
Really appreciated !
I have cleared my all concepts regarding domain 2 .please make video on further remaining domains soon. My exam is coming on 15 September.
All domains will be posted before next week hopefully
@@CyberNauts Thanks! I have my exam in June 19th!
@@led8229 Same I too have my exam in June 19th. Can you pls share me the exam material if you have.
@@nawazsherif4276how was the exam
Tomorrow my exam
Again question 41. It should be BCP - at this point I stopped watching this video, because this is confusing me to what I have learned from the study material. NO offence though, but this does not seem to be relevant.
I agree. I just looked at the notes I took from the ISC study material and its definitely BCP. 🤔🤔
@@anthonytaylor5910 Just read study material and google few topics for clarification if required instead of looking on such question sets. This will confuse you more. If concepts are clear you will definitely pass the exam. All the best!!
@@bvwproductions thank you sir yeah my exam is scheduled for Aug 10th. Definitely will just refer to the study materials and Google.
Exactly. And Question 54 confirms that too.
@@anthonytaylor5910I am also appearing on 10 aug for exam
Are u sure with 9 . It says the data is already compromised so that means breach
I Was worried honestly.
I think the answer to QUESTION 9 should be A.
A security incident refers to a violation of a company’s security policy. On the other hand, a security breach is when an unauthorized actor gains access to data, applications, network or devices which results in information being stolen or leaked
Funny you mention those so look at it this way.
Breach - Internal (Employee) unauthorized access
Intrusion - External (hacker) unauthorized access
Exploit - External (hacker) deliberate attack
Hope this helps.
Q23. The Answer is A as it has negative consequences of the event
Thanks Dear FOr this video , kindly make all 3 remaining domains so that i can pass my exams before 15th
can anyone explain between difference question 15-16
Expecting more such videos in QuickTime
I think there is some kind of discrepancies in your answers. Q.23 - as per the ISC2 material the answer should be Adverse Events and not incidents. If not, please explain.
No, the answer is Incident because incident means an unplanned event that could have a negative impact on an organization. And here, system crash is an unplanned event.
Incident “BEST” describes that scenario
you are right it adverse event as per ISC2 chapter 2 see below
Chapter Terms and Definitions
Adverse Events
Events with a negative consequence, such as system crashes, network packet floods, unauthorized
use of system privileges, defacement of a web page or execution of malicious code that destroys
data.
@@NourishFitLife Yes. You're right. As per ISC2 Official CC training, it should be adverse event.
Q34 should be "Security Operations Center Team or SOC Team" instead of just "Security Operations Center"
I want to understand how and why the answer to number 38 is not C but B.
Option C is too specific. A typical IR plan involves appropriate representatives across the organization.
@@auracle_illusionist Why not B & C ?
A typical incident response team is a cross-functional group of individuals who represent the management, technical and functional areas of responsibility most directly impacted by a security incident. Potential team members include the following:
Representative(s) of senior management
Information security professionals
Legal representatives
Public affairs/communications representatives
Engineering representatives (system and network)
@@joelam4362 isn't funny these ppl don't know whats going on in IT and still representing us
some mistakes noticed, look at Q. 27
What mistakes ?
Hi please re-look the answer of 27th question in the 5 th video (I e BC DR IR chapter)
The right ans is option B
Qn. 27, answer is B.
Question 35 the written question is different from the audio 😅
Answer 9 will be breach. not intrusion.
Q48 doesn't seem to be right as per your explanation..
Question 23 is wrong the answer is A
How are questions 9 and 14 different answers? Nuts.
Funny you mention those so look at it this way.
Breach - Internal (Employee) unauthorized access
Intrusion - External (hacker) unauthorized access
Exploit - External (hacker) deliberate attack
Hope this helps.
Answer for question 38 should be D
Question 20 is C
Thank you. Finally.
I’m not gonna be confused on something i spent a whole day dedicating to grasping
q 54 answer should be d
question 27 answer mismatch
Q:6 wrong
Material is outdated. Wrote my exam and non of these were there. Make sure to study first. 😉
Men. The answer for question 30 is D. The disaster is still goin on. Its main goal is to ensure that all people in the facility is safe by guiding the erp
Lol at 27.
I think this content is AI generated that is why so many mistakes, I have doubt on some ques and verify them with ChatGpt and it shows the same answer what GPt answer😂
Q.54 answer is D, instead of C, checked with isc2