BLOGSPOT atas

Monday, August 31, 2015

How to Create a Social-Media Marketing Plan From Scratch (Infographic)

You should choose the social networks that best fit your strategy and the goals you want to achieve on social media. http://www.entrepreneur.com/article/249306

- Muhammad Idham Azhari

Sunday, August 30, 2015

What the Color of Your Logo Says About Your Company (Infographic)

The Golden Arches just wouldn't communicate the same thing if they were purple. http://www.entrepreneur.com/article/247783

- Muhammad Idham Azhari

Friday, August 28, 2015

Logo Design Inspiration - 28 August 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 310)

(310) Management can expect penetration tests to provide all of the following EXCEPT

A. identification of security flaws
B. demonstration of the effects of the flaws
C. a method to correct the security flaws.
D. verification of the levels of existing infiltration resistance

Correct Answer: C

Explanation

Explanation/Reference:

Explanation:

Penetration testing is a set of procedures designed to test and possibly bypass security controls of a system. Its goal is to measure an organization's resistance to an attack and to uncover any weaknesses within the environment...The result of a penetration test is a report given to management describing the list of vulnerabilities that were identified and the severity of those vulnerabilities. From here, it is up to management to determine how the vulnerabilities are dealt with and what countermeasures are implemented. - Shon Harris All-in-one CISSP Certification Guide pg 837-839

- Muhammad Idham Azhari

Instagram Photos and Videos No Longer Need to Be Square

It's an end of an Insta-era. http://www.entrepreneur.com/article/250035

- Muhammad Idham Azhari

Thursday, August 27, 2015

5 Million-Dollar Home-Based Business Ideas You Can Use Today

Teach an online course. Write an ebook. Conceive a product you yourself need. The ideas are out there. Get started! http://www.entrepreneur.com/article/249670

- Muhammad Idham Azhari

Sunday, August 23, 2015

3 Simple Tips to Boost Your SEO on YouTube

You need to have a presence on the second largest search engine. Here are a few pointers to get you started. http://www.entrepreneur.com/article/249482

- Muhammad Idham Azhari

Friday, August 21, 2015

Logo Design Inspiration - 21 August 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 309)

(309) Why would an information security policy require that communications test equipment be controlled?

A. The equipment is susceptible to damage
B. The equipment can be used to browse information passing on a network
C. The equipment must always be available for replacement if necessary
D. The equipment can be used to reconfigure the network multiplexers

Correct Answer: B

Explanation


Explanation/Reference:

- Muhammad Idham Azhari

How to Overcome 6 Obstacles Facing Every Online Marketer

The Internet offers a vastly bigger marketing opportunity than ever existed. You're not the only one who finds it overwhelming sometimes. http://www.entrepreneur.com/article/249687

- Muhammad Idham Azhari

Friday, August 14, 2015

Logo Design Inspiration - 14 August 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 308)

(308) Which of the following statements pertaining to ethical hacking is incorrect?

A. An organization should use ethical hackers who do not sell auditing, consulting, hardware, software, firewall, hosting, and/or networking services
B. Testing should be done remotely
C. Ethical hacking should not involve writing to or modifying the target systems
D. Ethical hackers should never use tools that have potential of exploiting vulnerabilities in the organizations IT system.

Correct Answer: D

Explanation


Explanation/Reference:

- Muhammad Idham Azhari

Friday, August 7, 2015

Logo Design Inspiration - 07 August 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 307)

(307) What tool do you use to determine whether a host is vulnerable to known attacks?

A. Padded Cells
B. Vulnerability analysis
C. Honey Pots
D. IDS

Correct Answer: B

Explanation

Explanation/Reference:

Explanation:

Vulnerability analysis (also known as vulnerability assessment) tools test to determine whether a network or host is vulnerable to known attacks. Vulnerability assessment represents a special case of the intrusion detection process. The information sources used are system state attributes and outcomes of attempted attacks. The information sources are collected by a part of the assessment engine. The timing of analysis is interval-based or batch-mode, and the type of analysis is misuse detection. This means that vulnerability assessment systems are essentially batch mode misuse detectors that operate on system state information and results of specified test routines.

- Muhammad Idham Azhari