My interpretation of Question 1 focused on the fact that Jared manages *critical applications* for his org. If he's considering a secondary location, with a *cloud service provider* in mind, the only answer that comes to mind is D. Hot Site. To explain, a cold site requires far too much time to get set up, a warm site is better but still usually takes several hours, and a mobile site isn't valid because the question says nothing about needing a transportable and physical set of assets. The new secondary location is already going to be on the cloud, after all. A hot site on the cloud enables Jared and the org to very quickly restore access and functionality to the critical assets mentioned, making it the correct choice. If I got anything wrong, feel free to reply. I'll be taking and passing the Sec+ soon, and welcome any feedback :)
@@W3GeekOfficial Heck yeah! Thanks for the quick reply :) I originally started doubting my answer once I read some of the comments by people confused by Q1, so I had to do a quick write-up to double-check that I wasn't losing my mind. Glad I had it all right in the end! Keep up the good work David, loving the videos so far.
Good review, thanks! Question 7, I’d argue we aren’t given enough information to know if that’s BYOD or COPE. All it says is she needs to be reachable by phone and they threw the COBO concept out the window?
BYOD would mean you paid for it and you own it so the company can't put security controls or maintain for you. COPE would mean the company paid for it put correct security controls that regard their policies and practices but you can use it at your will for your personal life.
@@jamesbaysinger9780the question only states that they don’t use the same policy as her old company. Technically, if they had BYOD, that would still count as throwing the old concept out the window. I got it right cause I assumed what the question implied but the question could state that the new company is giving Janelle a company phone.
Here's my interpretation of the question: Nowhere did the question stated that the person was allowed to bring their own device. Since that information was lacking, it would be good to assume she is still having the company provide the device in question since the story never explicitly stated she could bring her own. In this sense, the company is using a Mobile Device Management (MDM) tool to protect the data on the phone and prevent her from accessing it unless she is on company property.
Thanks a lot Sir, just got a new subscriber today....I am currently studying Security+ that's after failing my N10-008 twice, very stressed... Wondering if the security+ exam will be easier for me...pls any advice.Thank you!
Applause for those spreading free cybersecurity education! I'm adding to the resources with videos on cybersecurity and CompTIA Security+. Let's grow together!
The wording was great! I don’t know why people in the comments say otherwise. Question though, are the question on the real test only going to use acronyms?
Hi! Thanks for the comment! I'm always open to suggestions to be able to continuously improve the content I create! Can you suggest a better way to word question number 1? What did you find confusing about it? Thanks for any suggestions or feedback, I appreciate it!
My understanding is that the cloud can act as both a warm and a hot site but most companies would use it as a hot site in this scenario since the company only has 1 data center atm having a hot site would serve them much better incase something goes wrong with site numero uno
@@W3GeekOfficialit doesn’t specify if he is wanting to ACTUALLY create a hot site or a warm site. It’s just inferring that he wants to do something for another site
Hi! Thanks for the comment! Remember that a warm site can potentially take hours to become live. If the company has a critical application, as mentioned in the first part of the question, then a hot site is going to be their best option.
i missed the question on the phone because it was poorly worded. In the question , it literally didn't even state that the new company didn't hand her a COPE phone. just said reachable. Uhm. My personal phone is reachable and it literally stated that the new company threw that out the window. OK , THEN WHAT IS THE NEW POLICY IN PLACE?
Actually, answer D - SCADA - is what is known as a distractor. It’s meant to sound like a valid answer while still being wrong. Yes, SCADA - Supervisory Control and Data Acquisition systems are used in factories and manufacturing plants. Remember to look at what the question is actually asking though - what is the best method of securing this system. When you use a legacy system like Windows NT 4.0, the BEST method of SECURING those systems is to air gap them. That is, disconnecting them from the network altogether or running them on a standalone network that cannot be accessed from outside of the facility. A SCADA system could describe what the Windows NT machine is doing - reading sensors and controlling valves or other types of PLCs. But it wouldn’t be the best method of securing the system. Does that explanation help?
Although I got this one right I can see how someone would be confused. I think most people would expect the question to say it's connected to another network. What gave the answer away was that it's a legacy system so it's not receiving updates and patches which would make it vulnerable. The best way to secure a vulnerable system is not have it connected not directly at least.
My interpretation of Question 1 focused on the fact that Jared manages *critical applications* for his org. If he's considering a secondary location, with a *cloud service provider* in mind, the only answer that comes to mind is D. Hot Site.
To explain, a cold site requires far too much time to get set up, a warm site is better but still usually takes several hours, and a mobile site isn't valid because the question says nothing about needing a transportable and physical set of assets. The new secondary location is already going to be on the cloud, after all.
A hot site on the cloud enables Jared and the org to very quickly restore access and functionality to the critical assets mentioned, making it the correct choice.
If I got anything wrong, feel free to reply. I'll be taking and passing the Sec+ soon, and welcome any feedback :)
You’re right on the money! Good job!
@@W3GeekOfficial Heck yeah! Thanks for the quick reply :)
I originally started doubting my answer once I read some of the comments by people confused by Q1, so I had to do a quick write-up to double-check that I wasn't losing my mind. Glad I had it all right in the end!
Keep up the good work David, loving the videos so far.
Good review, thanks!
Question 7, I’d argue we aren’t given enough information to know if that’s BYOD or COPE. All it says is she needs to be reachable by phone and they threw the COBO concept out the window?
BYOD would mean you paid for it and you own it so the company can't put security controls or maintain for you. COPE would mean the company paid for it put correct security controls that regard their policies and practices but you can use it at your will for your personal life.
The question stated it is a company device so BYOD is out the window
@@jamesbaysinger9780the question only states that they don’t use the same policy as her old company. Technically, if they had BYOD, that would still count as throwing the old concept out the window. I got it right cause I assumed what the question implied but the question could state that the new company is giving Janelle a company phone.
you are 100% correct on that poorly worded question. I wrote a comment on that as well above.
Here's my interpretation of the question:
Nowhere did the question stated that the person was allowed to bring their own device. Since that information was lacking, it would be good to assume she is still having the company provide the device in question since the story never explicitly stated she could bring her own. In this sense, the company is using a Mobile Device Management (MDM) tool to protect the data on the phone and prevent her from accessing it unless she is on company property.
Shocked at all of the negative comments around how questions were worded! I thought this was a great review. Thank you!
Thanks a lot Sir, just got a new subscriber today....I am currently studying Security+ that's after failing my N10-008 twice, very stressed... Wondering if the security+ exam will be easier for me...pls any advice.Thank you!
Have you written questions for comptia that are used on their exams? Or just similar questions for student practice?
Thanks for this David, scored 9/10, questions made sense. Hoping to take the 701+ soon.
Hello Dave, can you please include more contents on CompTIA Network and Security+
Many thanks 👍
Applause for those spreading free cybersecurity education! I'm adding to the resources with videos on cybersecurity and CompTIA Security+. Let's grow together!
I have got 9/10 questions correct but still need more practice to have a big bite of the elephant. Thanks David!
Amazing video, thank you sir
The wording was great! I don’t know why people in the comments say otherwise. Question though, are the question on the real test only going to use acronyms?
last question comptia security+ names "mantrap" as " access control vestibule" now
Started out rough and rallied back to a 7/10. More studying to do!
It's a tough exam for sure! Best of luck!
9/10 Good practice! Wish you dove a little bit deeper into the other answers for each question (obviously not the made up ones) but good either way!
this was simply wonderful
Thank you! I'm glad you enjoyed them!
10/10 - writing it on Monday.
Did you pass??
@@jamesbaysinger9780 yea
The first question is worded really terribly, but even with getting that wrong I got eight out of 10
Hi! Thanks for the comment! I'm always open to suggestions to be able to continuously improve the content I create! Can you suggest a better way to word question number 1? What did you find confusing about it? Thanks for any suggestions or feedback, I appreciate it!
My understanding is that the cloud can act as both a warm and a hot site but most companies would use it as a hot site in this scenario since the company only has 1 data center atm having a hot site would serve them much better incase something goes wrong with site numero uno
@@W3GeekOfficialit doesn’t specify if he is wanting to ACTUALLY create a hot site or a warm site. It’s just inferring that he wants to do something for another site
9/10. i think the first answer could be warm too
Hi! Thanks for the comment! Remember that a warm site can potentially take hours to become live. If the company has a critical application, as mentioned in the first part of the question, then a hot site is going to be their best option.
i missed the question on the phone because it was poorly worded. In the question , it literally didn't even state that the new company didn't hand her a COPE phone. just said reachable. Uhm. My personal phone is reachable and it literally stated that the new company threw that out the window. OK , THEN WHAT IS THE NEW POLICY IN PLACE?
thanks for those questions, and also i got free practice test on udemy as well☺, thanks again🙏
You're quite welcome! Glad you enjoyed them!
great work
Thank you, I'm glad you enjoyed them!
Thank you! 🙌
You're quite welcome! Best of luck on your exam!
Just take the exam today, however non of this practice question showing up in the exam
That’s correct. This is not a brain dump. These are to help you gauge your knowledge. Brain dumps are cheating and unethical. :-)
Sir, 9th answer is wrong. As the systems are running Windows NT 4.0 for manufacturing purpose, it should be D) SCADA.
Actually, answer D - SCADA - is what is known as a distractor. It’s meant to sound like a valid answer while still being wrong. Yes, SCADA - Supervisory Control and Data Acquisition systems are used in factories and manufacturing plants. Remember to look at what the question is actually asking though - what is the best method of securing this system. When you use a legacy system like Windows NT 4.0, the BEST method of SECURING those systems is to air gap them. That is, disconnecting them from the network altogether or running them on a standalone network that cannot be accessed from outside of the facility.
A SCADA system could describe what the Windows NT machine is doing - reading sensors and controlling valves or other types of PLCs. But it wouldn’t be the best method of securing the system. Does that explanation help?
Although I got this one right I can see how someone would be confused. I think most people would expect the question to say it's connected to another network. What gave the answer away was that it's a legacy system so it's not receiving updates and patches which would make it vulnerable. The best way to secure a vulnerable system is not have it connected not directly at least.
Version 701 seems easier than 601.
I still don’t understand why #7 is not BYOD 😂
these questions were worded so terribly LOL hopefully people arent using this as a final check before taking the real exam
Why, please ? What do you suggest? Thanks in advance.
They're fine.
Great work
Thank you!