CyberRacheal Profile Banner
Cyber_Racheal Profile
Cyber_Racheal

@CyberRacheal

Followers
5K
Following
20K
Media
40
Statuses
3K

|| Cybersecurity and Cloud Instructor || CyberGirlie || Program Coordinator || WiCys West Africa ||Security Awareness Coach

Ghana
Joined January 2019
Don't wanna be here? Send us removal request.
@CyberRacheal
Cyber_Racheal
1 year
Group link:.
Tweet card summary image
t.me
@CyberRacheal
Cyber_Racheal
1 year
Let’s make a thread. Comment “I need an accountability partner” in cybersecurity. Let’s connect and help one other grow in this cyber space. Something a little more push is what we need.
6
6
63
@CyberRacheal
Cyber_Racheal
14 hours
RT @CyberRacheal: Dear Cyberians, . I’m late for my usual question and answers, pardon me. There’s been a power outage here. We will resu….
0
3
0
@CyberRacheal
Cyber_Racheal
14 hours
Dear Cyberians, . I’m late for my usual question and answers, pardon me. There’s been a power outage here. We will resume soon.
1
3
19
@CyberRacheal
Cyber_Racheal
4 days
RT @CyberRacheal: Digital signatures provide which of the following security benefits?. A. Data availability and redundancy. B. Data confid….
0
3
0
@CyberRacheal
Cyber_Racheal
4 days
Digital signatures provide which of the following security benefits?. A. Data availability and redundancy. B. Data confidentiality and encryption. C. Data integrity and non-repudiation. D. Data anonymization and obfuscation.
26
3
25
@CyberRacheal
Cyber_Racheal
4 days
RT @CyberRacheal: A. Determining the likelihood of occurrence of a set of risks involves estimating the likelihood that the identified risk….
0
2
0
@CyberRacheal
Cyber_Racheal
4 days
A. Determining the likelihood of occurrence of a set of risks involves estimating the likelihood that the identified risks will occur, along with the potential impact it could have on the organization ✅.
@CyberRacheal
Cyber_Racheal
5 days
When analyzing risks, which of these activities is required?. A. Determining the likelihood of occurrence of a set of risks. B. Accepting all evaluated risks. C. Identifying risks associated with loss of confidentiality. D. Selecting the appropriate controls.
1
2
11
@CyberRacheal
Cyber_Racheal
5 days
RT @CyberRacheal: When analyzing risks, which of these activities is required?. A. Determining the likelihood of occurrence of a set of ris….
0
3
0
@CyberRacheal
Cyber_Racheal
5 days
When analyzing risks, which of these activities is required?. A. Determining the likelihood of occurrence of a set of risks. B. Accepting all evaluated risks. C. Identifying risks associated with loss of confidentiality. D. Selecting the appropriate controls.
11
3
15
@CyberRacheal
Cyber_Racheal
5 days
RT @CyberRacheal: A ping sweep is a commonly used method to map live hosts in a network. A ping sweep involves sending a series of ping mes….
0
3
0
@CyberRacheal
Cyber_Racheal
5 days
A ping sweep is a commonly used method to map live hosts in a network. A ping sweep involves sending a series of ping messages (ICMP Echo Request packets) to a range of IP addresses on a network so as to determine which hosts are currently online. D. Ping sweep✅.
@CyberRacheal
Cyber_Racheal
6 days
Which method is COMMONLY used to map live hosts in the network?. A. Geolocation. B. Traceroute. C. Wireshark. D. Ping sweep.
0
3
11
@CyberRacheal
Cyber_Racheal
5 days
RT @CyberRacheal: Take note 💯. Next Cyblack Internship will happen in January 2026. See you there.
0
3
0
@CyberRacheal
Cyber_Racheal
5 days
Take note 💯. Next Cyblack Internship will happen in January 2026. See you there.
@ireteeh
Dr Iretioluwa Akerele
5 days
Going forward, CyBlack Internship will now hold twice a year instead of three times. This change will allow us to enhance the program and maintain the high quality we are known for. The next internship cohort will commence in January 2026.
1
3
18
@CyberRacheal
Cyber_Racheal
6 days
RT @CyberRacheal: Which method is COMMONLY used to map live hosts in the network?. A. Geolocation. B. Traceroute. C. Wireshark. D. Ping swe….
0
4
0
@CyberRacheal
Cyber_Racheal
6 days
Which method is COMMONLY used to map live hosts in the network?. A. Geolocation. B. Traceroute. C. Wireshark. D. Ping sweep.
12
4
21
@CyberRacheal
Cyber_Racheal
6 days
RT @CyberRacheal: An IPSec VPN can prevent a replay.attack because it tracks packet sequencing and includes the sender's signature on all p….
0
2
0
@CyberRacheal
Cyber_Racheal
6 days
An IPSec VPN can prevent a replay.attack because it tracks packet sequencing and includes the sender's signature on all packets; therefore preventing forged packages. C. Use an IPSec VPN✅.
@CyberRacheal
Cyber_Racheal
7 days
BEST defense method to stop a 'Replay Attack' is to: . A. Use password authentication. B. Use message digesting. C. Use an IPSec VPN. D. Use a Firewall.
0
2
14
@CyberRacheal
Cyber_Racheal
7 days
RT @CyberRacheal: BEST defense method to stop a 'Replay Attack' is to: . A. Use password authentication. B. Use message digesting. C. Use a….
0
4
0
@CyberRacheal
Cyber_Racheal
7 days
BEST defense method to stop a 'Replay Attack' is to: . A. Use password authentication. B. Use message digesting. C. Use an IPSec VPN. D. Use a Firewall.
9
4
21
@CyberRacheal
Cyber_Racheal
7 days
RT @CyberRacheal: To allow 30 hosts + 2 addresses for broadcast and network addresses. Thus, we are looking for the mask 255.255.255.224, o….
0
3
0
@CyberRacheal
Cyber_Racheal
7 days
To allow 30 hosts + 2 addresses for broadcast and network addresses. Thus, we are looking for the mask 255.255.255.224, or /27 using CIDR notation. B. /27.
@CyberRacheal
Cyber_Racheal
8 days
Which of these different sub-masks will allow 30 hosts?. A. /26. B. /27. C. /29. D. /30.
2
3
13