BLOGSPOT atas

Wednesday, December 23, 2015

Logo Design Inspiration - 23 December 2015


- Idham Azhari

CISSP Exam Preparation (Question 327)

(327) Which of the following questions is less likely to help in assessing physical and environmental protection?

A. Are entry codes changed periodically?
B. Are appropriate fire suppression and prevention devices installed and working?
C. Are there processes to ensure that unauthorized individuals cannot read, copy, alter, or steal printed or electronic information?
D. Is physical access to data transmission lines controlled?

Correct Answer: C

Explanation


Explanation/Reference:

- Idham Azhari

Digital Marketing Agencies' Rates and Services Cost Less Than You Think

Finding the Right External Audit Firm

Friday, December 18, 2015

Logo Design Inspiration - 18 December 2015


- Idham Azhari

CISSP Exam Preparation (Question 326)

(326) A "critical application" is one that MUST

A. Remain operational for the organization to survive.
B. Be subject to continual program maintenance.
C. Undergo continual risk assessments.
D. Be constantly monitored by operations management.

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

I am assuming that I don't need to put a reference for this answer. Yeah ok here it is but I cheated and used a earlier reference "A BIA is performed at the beginning of disaster recovery and continuity planning to identify the areas that would suffer the greatest financial or operational loss in the event of a disaster or disruption. It identifies the company's critical systems needed for survival and estimates the outage time that can be tolerated by the company as a result of disaster or disruption." - Shon Harris All-in-one CISSP Certification Guide pg 597

- Idham Azhari

7 Social Media Power Techniques that Build Your Brand and Business

BlackBerry CEO Blasts Apple's Approach to Security

Friday, December 11, 2015

Logo Design Inspiration - 11 December 2015


- Idham Azhari

CISSP Exam Preparation (Question 325)

(325) What is the Maximum Tolerable Downtime (MTD):

A. Maximum elapsed time required to complete recovery of application data
B. Minimum elapsed time required to complete recovery of application data
C. Maximum elapsed time required to move back to primary site a major disruption
D. It is maximum delay businesses that can tolerate and still remain viable

Correct Answer: D

Explanation

Explanation/Reference:

"The MTD is the period of time a business function or process can remain interrupted before its ability to recover becomes questionable." Pg 678 Hansche: Official (ISC)2 Guide to the CISSP Exam

- Idham Azhari

50 Online Marketing Influencers to Watch in 2016

A Student's Experience at the CSX North America Conference

Friday, November 27, 2015

Logo Design Inspiration - 27 November 2015


- Idham Azhari

CISSP Exam Preparation (Question 323)

(323) Valuable paper insurance coverage does not cover damage to which of the following?

A. Inscribed, printed and written documents
B. Manuscripts
C. Records
D. Money and Securities

Correct Answer: D

Explanation


Explanation/Reference:

4 Ways to Increase Your Content's Reach Without Breaking the Bank

Friday, November 20, 2015

Logo Design Inspiration - 20 November 2015


- Idham Azhari

CISSP Exam Preparation (Question 322)

(322) Which risk management methodology uses the exposure factor multiplied by the asset value to determine its outcome?

A. Annualized Loss Expectancy
B. Single Loss Expectancy
C. Annualized Rate of Occurrence
D. Information Risk Management

Correct Answer: B

Explanation

Explanation/Reference:

Single Loss Expectancy (SLE) AN SLE is the dollar figure that is assigned to a single event. It represents an organization's loss from a single threat and is derived from the following formula: Asset Value ($) X Exposure Factor (EF) = SLE -Ronald Krutz The CISSP PREP Guide (gold edition) pg 18

- Idham Azhari

How Important Are Reviews for SEO?

EU Cracks Down On Bitcoin, Anonymous Payments Systems to Curb Terrorism Funding

Friday, November 13, 2015

Logo Design Inspiration - 13 November 2015


- Idham Azhari

CISSP Exam Preparation (Question 321)

(321) Qualitative loss resulting from the business interruption does not include:

A. Loss of revenue
B. Loss of competitive advantage or market share
C. Loss of public confidence and credibility
D. Public embarrassment

Correct Answer: A

Explanation

Explanation/Reference:
"Another method of risk analysis is qualitative, which does not assign numbers and monetary valu8es to components and losses." Pg 72 Shon Harris: All-in-One CISSP Certification

- Idham Azhari

How I Went From Zero to 5,000 Email Subscribers in 6 Months

Thursday, November 12, 2015

Tuesday, November 10, 2015

Friday, November 6, 2015

Logo Design Inspiration - 06 November 2015


- Idham Azhari

CISSP Exam Preparation (Question 320)

(320) How is Annualized Loss Expectancy (ALE) derived from a threat?

A. ARO x (SLE EF)
B. SLE x ARO
C. SLE/EF
D. AV x EF

Correct Answer: B

Explanation

Explanation/Reference:

"SLE x annualized rate of occurrence (ARO) = ALE" pg 70 Shon Harris: All-in-One CISSP Certification

- Idham Azhari

10 Ways to Get Into Your Customers' Heads Beyond Creating Buyer Personas

Buyer personas have one major weakness: they're completely made up. They're a good start, but try these tactics as well. http://www.entrepreneur.com/article/252461

What Skills Do you Need? Skills Framework Provides Insight

Thursday, November 5, 2015

6 Principles That Must Be Applied to Social Media Marketing

Learn the key principles of direct response marketing that you need to follow on all social media platforms. http://www.entrepreneur.com/article/251034

Wednesday, November 4, 2015

7 Strategies This Loud Digital Marketer Used to Reach More Than 300,000 Subscribers

Derek Halpern went from running a celebrity gossip site to becoming a famous name among marketers with Social Triggers. http://www.entrepreneur.com/article/251379

How to Identify 5 Common Phishing Attacks

The likeliest cyber threat individuals or small companies will face is an email with an urgent tone and prying questions. http://www.entrepreneur.com/article/252401

Tuesday, November 3, 2015

How Often Should You Update or Rebuild Your Website?

An expert explains what to consider when you're thinking of refreshing your company's website. http://www.entrepreneur.com/article/251652

5 Hobbies That Can Make You Smarter (Infographic)

Come and play. Growing your gray matter doesn't have to be boring. http://www.entrepreneur.com/article/252385

Friday, October 30, 2015

Logo Design Inspiration - 30 October 2015


- Idham Azhari

CISSP Exam Preparation (Question 319)

(319) If your property insurance has Actual Cost Evaluation (ACV) clause your damaged property will be compensated:

A. Based on the value of the item on the date of loss
B. Based on new item for old regardless of condition of lost item
C. Based on value of item one month before loss
D. Based on value of item on the date of loss plus 10 percent

Correct Answer: D

Explanation


Explanation/Reference:

- Idham Azhari

Engage People With Interactive Content With These 7 Cost-Effective Strategies

Although the ways through which we share stories these days have advanced technologically, the underlying principles haven't changed. http://www.entrepreneur.com/article/251873

The Top 3 Mistakes Businesses Make After a Hack

A cybersecurity expert explains what not to do after a data breach. http://www.entrepreneur.com/article/252281

Wednesday, October 28, 2015

Tuesday, October 27, 2015

2016 Recruiting Forecast for IT Professionals

Should Your Brand Throw a Twitter Party?

This hour-long event is a fantastic way to engage an audience while promoting your brand. http://www.entrepreneur.com/article/251934

7 Cybersecurity Layers Every Entrepreneur Needs to Understand

In light of the recent hacks of high profile companies and individuals, entrepreneurs would do well to understand and maximize their online protection. http://www.entrepreneur.com/article/252028

Monday, October 26, 2015

The Secret to the Perfect Holiday Email Campaign

Christmas is coming, and now is the time to start preparing your email marketing efforts. http://www.entrepreneur.com/article/251927

Friday, October 23, 2015

Logo Design Inspiration - 23 October 2015


- Idham Azhari

CISSP Exam Preparation (Question 318)

(318) Annualized Loss Expectancy (ALE) value is derived from an algorithm of the product of annual rate of occurrence and

A. Cost of all losses expected.
B. Previous year's actual loss.
C. Average of previous losses.
D. Single loss expectancy.

Correct Answer: D

Explanation

Explanation/Reference:

Single Loss Expectancy (SLE) x Annualized Rate of Occurance (ARO) = ALE pg. 18 Krutz: The CISSP Prep Guide

- Idham Azhari

The 9 Things to Consider When Working With Instagrammers

Here are a few pointers on how to engage with Instagram influencers and how to make them work with you on fair terms. http://www.entrepreneur.com/article/251776

Putting Your Business at Risk is a Communications Channel You'd Never Guess: Paper

Are you overlooking this risk factor, which last year caused 25 percent of federal agencies' security breeches? http://www.entrepreneur.com/article/251959

Thursday, October 22, 2015

10 Free Website Usability Tools to Improve Your Customer Experience

Cool stuff like Whatfix and Color Oracle can point you in the right direction to spend your budget wisely. http://www.entrepreneur.com/article/250112

Be Careful of Data That Can Cause Bad Insights

Just as good data can be of great value, bad data can be hugely detrimental. http://www.entrepreneur.com/article/251905

Wednesday, October 21, 2015

5 Tips for Effectively Setting Up Facebook Ads

The fact alone that you can target and segment an audience almost down to the color of pants someone wears on a Tuesday is incredibly valuable. http://www.entrepreneur.com/article/251626

Make Your Businesses Invulnerable to Corporate Identity Theft

Failure to keep up-to-date with corporate compliance chores can put your business, and you personally, at the mercy of criminals. http://www.entrepreneur.com/article/251617

Tuesday, October 20, 2015

3 Steps to Get Prospects Coming Back to Your Website

It takes seven to 13 interactions with a potential customer to deliver a sales-ready lead. Here a few ways to keep engagement high. http://www.entrepreneur.com/article/249542

Friday, October 16, 2015

Logo Design Inspiration - 16 October 2015


- Idham Azhari

CISSP Exam Preparation (Question 317)

(317) Which of the following tools can you use to assess your networks vulnerability?

A. ISS
B. All of the choices.
C. SATAN
D. Ballista

Correct Answer: B

Explanation

Explanation/Reference:

Explanation:

ISS, Ballista and SATAN are all penetration tools.

- Idham Azhari

4 Things Businesses Need to Know But Often Don't About Facebook Advertising

Marketing opportunities exist on the world's biggest social-media channel that you need to know about. http://www.entrepreneur.com/article/251026

Wednesday, October 14, 2015

10 Tips for Combining SEO and Content Marketing

Given the important role content marketing now plays in the success of online business, it's time that SEO ties the knot with content marketing. http://www.entrepreneur.com/article/251522

Don't Wait for a Disaster to Interrupt Business. Prepare Now.

Forty to 60 percent of small businesses never reopen after a disaster. Make sure yours isn't one of them. http://www.entrepreneur.com/article/249461

Tuesday, October 13, 2015

Do Keywords Still Matter?

Marketers who have been keyword-dependent should start learning as much as they can about other methods of improving SEO. http://www.entrepreneur.com/article/251524

Monday, October 12, 2015

How to Make Both Spontaneity and Planned Posts Work on Social Media

Social-media marketing is a tough discipline to master, because it makes two demands of marketers that seem to contradict each other. http://www.entrepreneur.com/article/251443

Friday, October 9, 2015

Logo Design Inspiration - 09 October 2015


- Idham Azhari

CISSP Exam Preparation (Question 316)

(316) Which of the following is not a valid reason to use external penetration service firms rather than corporate resources?

A. They are more cost-effective
B. They offer a lack of corporate bias
C. They use highly talented ex-hackers
D. They insure a more complete reporting

Correct Answer: C

Explanation


Explanation/Reference:

- Idham Azhari

The Popularity of Visual Content Will Only Increase, So You Must Be Prepared

Entrepreneurs that are refusing to get on board with this new frontier will almost certainly miss out. http://www.entrepreneur.com/article/250810

Aligning Entrepreneurship and Innovation Strategically Through Governance of Enterprise IT

Thursday, October 8, 2015

3 Inexpensive or Even Free Ways to Forge Your Business Web Presence

Pizza parlors? Radio stations? Many businesses 'invisible online' are overlooking free ways to claim what's already theirs. http://www.entrepreneur.com/article/249246

Wednesday, October 7, 2015

Tuesday, October 6, 2015

Monday, October 5, 2015

How Tapping Emotional Hot Buttons Can Make Your Content Go Viral

Here are three ways to bridge unexpected connections and innovative ideas, helping drive viral success. http://www.entrepreneur.com/article/251030

- Idham Azhari

Friday, October 2, 2015

Logo Design Inspiration - 02 October 2015


- Idham Azhari

CISSP Exam Preparation (Question 315)

(315) Penetration testing will typically include

A. Generally accepted auditing practices.
B. Review of Public Key Infrastructure (PKI) digital certificate, and encryption.
C. Social engineering, configuration review, and vulnerability assessment.
D. Computer Emergency Response Team (CERT) procedures.

Correct Answer: C

Explanation


Explanation/Reference:

- Idham Azhari

How the Experts Scale Their Content Strategies

Solid content marketing guides your blogging, social media, lead generation and even other facets of digital marketing such as pay-per-click ads and search-engine optimization. http://www.entrepreneur.com/article/250809

- Idham Azhari

Tuesday, September 29, 2015

Saturday, September 26, 2015

5 Types of Evergreen Content for Your Website

Evergreen content allows a brand to re-use, reshare and repurpose the same information, saving both time and resources while increasing the amount of traffic the website and business receive. http://www.entrepreneur.com/article/250788

- Idham Azhari

Your First 5 Days as a New Manager

Making the right moves during this critical time will ensure your success. http://www.entrepreneur.com/article/249853

- Idham Azhari

Friday, September 25, 2015

Logo Design Inspiration - 25 September 2015


- Idham Azhari

CISSP Exam Preparation (Question 314)

(314) What is the FIRST step that should be considered in a penetration test?

A. The approval of change control management.
B. The development of a detailed test plan.
C. The formulation of specific management objectives.
D. The communication process among team members.

Correct Answer: C

Explanation

Explanation/Reference:

Explanation:

The type of penetration test depends on the organization, its security objectives, and the management's goals. - Shon Harris All-in-one CISSP Certification Guide pg 838

- Idham Azhari

3 Tips for Promoting Your Products on Social Media

If done correctly, product placement on social media can generate a lot of talk , which will hopefully lead to an increase in sales. http://www.entrepreneur.com/article/250975

- Idham Azhari

In Government Hack, the Number of Fingerprints Stolen Has Jumped to 5.6 Million

Hackers who stole security clearance data on millions of Defense Department and other U.S. government employees got away with about 5.6 million fingerprint records, some 4.5 million more than initially reported, the government states. http://www.entrepreneur.com/article/250964

- Idham Azhari

Wednesday, September 23, 2015

How to Handle a Crazy Content-Production Calendar

If you're looking to expand your own content production efforts but aren't sure how to find the time in your busy calendar, check out these three tips. http://www.entrepreneur.com/article/250811

- Idham Azhari

4 Questions to Help You Price Your App in a 'Freemium' World

Streaming music, videos and games is still largely free. How do you get your piece of the pie? http://www.entrepreneur.com/article/249062

- Idham Azhari

Tuesday, September 22, 2015

Email Automation: Why You Need to Automate and How to Use It

From onboarding new subscribers and nurturing leads to creating deeper and ongoing conversations with your long-term loyal audience, email automation is ripe with benefits. http://www.entrepreneur.com/article/250830

- Idham Azhari

The Story Behind Brooklyn Brewery's Iconic Label

'It boiled down all the images I had in my head, and expressed them in an elegant, simple way. I think that's what great design does.' http://www.entrepreneur.com/article/250790

- Idham Azhari

Monday, September 21, 2015

The 5 Ws of Outsourcing Your Company's Content Creation

Content creation can get a bit out of hand, especially if you've made the brave decision to outsource some of the work. Trying to keep quality high, content on time and projects organized feels like a full-time job. http://www.entrepreneur.com/article/250487

- Idham Azhari

Sunday, September 20, 2015

How to Compete With a Billion-Dollar Business on Google

Even if your competition has hundreds of thousands of dollars allocated to its marketing budget, that doesn't mean it has effective SEO. http://www.entrepreneur.com/article/250756

- Idham Azhari

The 7 Factors That Make for Viral Content

There is no formula for creating content people will share but there are some essentials that make it far more likely they will. http://www.entrepreneur.com/article/250249

- Idham Azhari

Friday, September 18, 2015

Logo Design Inspiration - 18 September 2015


- Idham Azhari

CISSP Exam Preparation (Question 313)

(313) Open box testing, in the Flaw Hypothesis Methodology of Penetration Testing applies to the analysis of

A. Routers and firewalls
B. Host-based IDS systems
C. Network-based IDS systems
D. General purpose operating systems

Correct Answer: D

Explanation

Explanation/Reference:

Explanation:

Flaw Hypothesis Methodology - A system analysis and penetration technique where specifications and documentation for the system are analyzed and then flaws in the system are hypothesized. The list of hypothesized flaws is then prioritized on the basis of the estimated probability that a flaw actually exists and, assuming a flaw does exist, on the ease of exploiting it and on the extent of control or compromise it would provide. The prioritized list is used to direct the actual testing of the system. http://www.kernel.org/pub/linux/ libs/security/Orange-Linux/refs/Orange/Orange0-5.html

- Idham Azhari

Using Cyber Risk Intelligence to Identify the Controls You Should Focus On

15 One-Sentence Chunks of Online Marketing Advice You Can Use Today

SEO, pay per click, content marketing and more: It's here, it's concise, it's proven. http://www.entrepreneur.com/article/250681

- Idham Azhari

Tuesday, September 15, 2015

5 Things You Do Everyday That Make You Vulnerable Online

You could be putting your personal information at risk without even realizing it. http://www.entrepreneur.com/article/250405

- Idham Azhari

A 6-Step Checklist to Get Your Online Business Ready for the Holiday Season

Waiting too long puts you at a severe disadvantage -- you need to be ready to capitalize on the increased traffic and the mindset of consumers during this period. http://www.entrepreneur.com/article/250399

- Idham Azhari

Sunday, September 13, 2015

3 Questions to Ask When Deciding Between Content Marketing and Native Advertising

Companies are looking to achieve the best results while still running lean and mean, and the industry awaits to see if one strategy will deliver a knockout punch. http://www.entrepreneur.com/article/248458

- Idham Azhari

Friday, September 11, 2015

Logo Design Inspiration - 11 September 2015


- Muhammad Idham Azhari

CISSP Exam Preparation (Question 312)

(312) Which one of the following is the PRIMARY objective of penetration testing?

A. Assessment
B. Correction
C. Detection
D. Protection

Correct Answer: C

Explanation

Explanation/Reference:

Explanation:
Its goal is to measure an organization's resistance to an attack and to uncover any weakness within the environment...The result of a penetration test is a report given to management describing the list of vulnerabilities that were identified and the severity of those vulnerabilities. - Shon Harris All-in-one CISSP Certification Guide pg 837-839

Not A: Assessment would imply management deciding whether they can live with a given vulnerability.

- Muhammad Idham Azhari

Remaining Driven in Face of Obstacles

How You Can Generate Results From Promoted Pins on Pinterest

Pinterest's devoted users and ability to manufacture intent have made it a great way to drive valuable traffic to your site. http://www.entrepreneur.com/article/249893

- Muhammad Idham Azhari

Wednesday, September 9, 2015

12 Sites That Will Teach You Coding for Free

Programming has helped me to become a much better entrepreneur, and you can learn this skill without spending a dime. http://www.entrepreneur.com/article/250323

- Muhammad Idham Azhari

3 Steps to Boost Your Social-Media Marketing With Image Tagging

Use the new online tools that give your brand images enhanced context and make them easier to find. http://www.entrepreneur.com/article/248877

- Muhammad Idham Azhari

Monday, September 7, 2015

3 Inexpensive Ways to Build Up Your Website Content

Fulfilling the demand for information and entertainment can be a challenge for smaller companies with limited manpower and financial resources but working within these limits is not impossible. http://www.entrepreneur.com/article/250049

- Muhammad Idham Azhari

Sunday, September 6, 2015

6 Growth-Hacking Tips to Boost Your Website's Traffic

These cheat sheets will help boost lead generation and increase your contacts. http://www.entrepreneur.com/article/250265

- Muhammad Idham Azhari