
Cyber_Racheal
@CyberRacheal
Followers
5K
Following
20K
Media
40
Statuses
3K
|| Cybersecurity and Cloud Instructor || CyberGirlie || Program Coordinator || WiCys West Africa ||Security Awareness Coach
Ghana
Joined January 2019
Group link:.
t.me
Let’s make a thread. Comment “I need an accountability partner” in cybersecurity. Let’s connect and help one other grow in this cyber space. Something a little more push is what we need.
6
6
63
RT @CyberRacheal: Dear Cyberians, . I’m late for my usual question and answers, pardon me. There’s been a power outage here. We will resu….
0
3
0
RT @CyberRacheal: Digital signatures provide which of the following security benefits?. A. Data availability and redundancy. B. Data confid….
0
3
0
RT @CyberRacheal: A. Determining the likelihood of occurrence of a set of risks involves estimating the likelihood that the identified risk….
0
2
0
A. Determining the likelihood of occurrence of a set of risks involves estimating the likelihood that the identified risks will occur, along with the potential impact it could have on the organization ✅.
When analyzing risks, which of these activities is required?. A. Determining the likelihood of occurrence of a set of risks. B. Accepting all evaluated risks. C. Identifying risks associated with loss of confidentiality. D. Selecting the appropriate controls.
1
2
11
RT @CyberRacheal: When analyzing risks, which of these activities is required?. A. Determining the likelihood of occurrence of a set of ris….
0
3
0
RT @CyberRacheal: A ping sweep is a commonly used method to map live hosts in a network. A ping sweep involves sending a series of ping mes….
0
3
0
A ping sweep is a commonly used method to map live hosts in a network. A ping sweep involves sending a series of ping messages (ICMP Echo Request packets) to a range of IP addresses on a network so as to determine which hosts are currently online. D. Ping sweep✅.
Which method is COMMONLY used to map live hosts in the network?. A. Geolocation. B. Traceroute. C. Wireshark. D. Ping sweep.
0
3
11
RT @CyberRacheal: Take note 💯. Next Cyblack Internship will happen in January 2026. See you there.
0
3
0
Take note 💯. Next Cyblack Internship will happen in January 2026. See you there.
Going forward, CyBlack Internship will now hold twice a year instead of three times. This change will allow us to enhance the program and maintain the high quality we are known for. The next internship cohort will commence in January 2026.
1
3
18
RT @CyberRacheal: Which method is COMMONLY used to map live hosts in the network?. A. Geolocation. B. Traceroute. C. Wireshark. D. Ping swe….
0
4
0
RT @CyberRacheal: An IPSec VPN can prevent a replay.attack because it tracks packet sequencing and includes the sender's signature on all p….
0
2
0
An IPSec VPN can prevent a replay.attack because it tracks packet sequencing and includes the sender's signature on all packets; therefore preventing forged packages. C. Use an IPSec VPN✅.
BEST defense method to stop a 'Replay Attack' is to: . A. Use password authentication. B. Use message digesting. C. Use an IPSec VPN. D. Use a Firewall.
0
2
14
RT @CyberRacheal: BEST defense method to stop a 'Replay Attack' is to: . A. Use password authentication. B. Use message digesting. C. Use a….
0
4
0
RT @CyberRacheal: To allow 30 hosts + 2 addresses for broadcast and network addresses. Thus, we are looking for the mask 255.255.255.224, o….
0
3
0