Victor

253 posts

Victor

Victor

@rootuser24

DFIR Aspirant.

Root Bergabung Ekim 2025
55 Mengikuti52 Pengikut
TheCyberPatronNetwork ©
TheCyberPatronNetwork ©@TheCyberPatron_·
SECURITY+ EXAM PRACTICE QUESTION What important encryption challenge does asymmetric encryption help with by using public keys? A. Evil twins B. Collision resistance C. Key length D. Key exchange
English
8
1
24
1.7K
Abdulkadir | Cybersecurity
SECURITY+ KNOWLEDGE CHECKPOINT Which of the following is an example of something you are in authentication? A. Password B. PIN C. Fingerprint D. Security token
English
25
6
90
9K
kelvinlina𖤍💜✨
kelvinlina𖤍💜✨@cybergirl_io·
Network Security Knowledge check Which protocol is used to resolve IP addresses to MAC addresses? A) DNS B) ARP C) ICMP D) HTTP
English
38
6
148
15.9K
Abdulkadir | Cybersecurity
LINUX KNOWLEDGE CHECKPOINT What does the permission string -rw-r--r-- indicate? A. Owner: read/write, Group: read, Others: read B. Owner: read/write/execute, Group: read, Others: none C. Owner: read, Group: read/write, Others: read D. Owner: full access, Group: read/write, Others: none
English
26
4
44
5.6K
Abdulkadir | Cybersecurity
NETWORKING KNOWLEDGE CHECKPOINT Which combination correctly matches the protocol with its default port? A. HTTP — 443 B. SSH — 22 C. FTP — 25 D. DNS — 80
English
37
7
173
24.6K
kelvinlina𖤍💜✨
kelvinlina𖤍💜✨@cybergirl_io·
Network Security Knowledge check What’s the default port for FTP? A) 20/21 B) 22 C) 23 D) 110
English
32
4
138
20.2K
Abdulkadir | Cybersecurity
SECURITY+ KNOWLEDGE CHECKPOINT A company installs security cameras that record activity but do not actively stop incidents. What type of control is this? A. Preventive control B. Detective control C. Corrective control D. Deterrent control
English
17
2
64
8K
Julian Derry
Julian Derry@CyberSamuraiDev·
My DMs have been flooded lately with three specific questions 1. How do I start in Digital Forensics? 2. Will you mentor me? 3. Can I switch careers into DFIR? It’s great to see the field finally getting the recognition it deserves. One quick note, I don’t respond to requests about hacking partners or employees. Digital Forensics is a highly ethical profession and I intend to keep it that way. Since I can't reply to everyone individually, I’m thinking of putting together a program to take you from Beginner ➔ Intermediate. Would you be interested? Let me know in the replies👇
English
59
11
114
6.3K
Victor
Victor@rootuser24·
Day 88-89/100days challenge. Yesterday I rested. Today I continued with my Security+ study in which I covered Cloud Specific Vulnerabilities, Supply Chain Vulnerabilities, Misconfiguration Vulnerabilities and Mobile Device Vulnerabilities. Also on TryHackMe, I completed two rooms on Introduction to SIEM and Splunk: The Basics. I learnt how a SIEM is used to collect, normalize and correlate logs from various devices across a network. Also I did a hands-on practice of how Splunk works and how data can be uploaded and analyzed. tryhackme.com/room/introtosi… tryhackme.com/room/splunk101… @ireteeh @OnijeC @jay_hunts @segoslavia @commando_skiipz @RedHatPentester @Officialwhyte22 @TemitopeSobulo @_DeejustDee @cyberjeremiah #BlueTeamer #100dayscybersecurity
Victor tweet mediaVictor tweet mediaVictor tweet mediaVictor tweet media
Victor@rootuser24

Day 87/100days challenge. Today in my Security+ study, I learnt about SQL Injection, Cross-Site Scripting (XSS), Hardware Vulnerabilities, and Virtualization Vulnerabilities. Also On TryHackMe today i completed a room on Introduction to EDR (Endpoint Detection and Response). I explored how EDR solutions monitor endpoints, collect telemetry, detect suspicious behavior, and help security analysts investigate and respond to threats effectively. tryhackme.com/room/introduct… @ireteeh @OnijeC @jay_hunts @segoslavia @commando_skiipz @RedHatPentester @Officialwhyte22 @TemitopeSobulo @_DeejustDee @cyberjeremiah #BlueTeamer #100dayscybersecurity

English
0
2
7
598
kelvinlina𖤍💜✨
kelvinlina𖤍💜✨@cybergirl_io·
In cybersecurity, what does the CIA triad stand for? Wrong answers only ! A) Confidentiality, Integrity, Availability B) Cybersecurity, Intelligence, Access C) Control, Identity, Authentication D) Code, Information, Assurance
English
77
6
100
6.6K
Julian Derry
Julian Derry@CyberSamuraiDev·
A phone connects to a Wi-Fi network. What useful evidence can this create? A. Changes the phone color B. Stores network names and connection history C. Deletes browsing data D. Blocks GPS
English
7
0
2
368
Julian Derry
Julian Derry@CyberSamuraiDev·
Digital Forensics Intermediate-Expert Challenge A suspect deletes a file and continues using the phone. What happens to that deleted data over time? A. It becomes encrypted B. It is gradually overwritten by new data C. It moves to the SIM card D. It is uploaded to the cloud 4 more questions below 👇
English
8
6
23
2.7K
Julian Derry
Julian Derry@CyberSamuraiDev·
Which of these could still contain evidence after a message is deleted? A. Notification logs B. Screen brightness settings C. Wallpaper settings D. Ringtone selection
English
7
0
0
389
Julian Derry
Julian Derry@CyberSamuraiDev·
Why can timestamps sometimes be misleading in an investigation? A. Phones don’t store time B. They can be changed by the system or user C. They are always encrypted D. They only apply to images
English
7
0
1
323
Julian Derry
Julian Derry@CyberSamuraiDev·
Which of these is the most reliable way to prove a file has NOT been altered? A. Checking the file name B. Looking at the file size C. Comparing hash values D. Opening the file
English
6
0
3
440