ClickSafe Community(CSC) Profile
ClickSafe Community(CSC)

@ClickSafeCSC

Followers
100
Following
591
Media
11
Statuses
444

Cybersecurity Community

Accra, Ghana
Joined January 2025
Don't wanna be here? Send us removal request.
@ClickSafeCSC
ClickSafe Community(CSC)
7 months
Amazing news here 🥳🥳 As the first half of the year is over, We begin a new Cluster of ClickSafe community. Do you want to transition or upskill in your Cybersecurity journey? This is for you. Join the 2nd Cluster of CSC community. https://t.co/GyXtdthFvn
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
4
9
@CyberRacheal
Cyber_Racheal
22 minutes
Which of the following is NOT a feature of a cryptographic hash function? A. Reversible B. Deterministic C. Unique D. Useful
3
3
5
@CyberRacheal
Cyber_Racheal
24 minutes
Explanation: Security Information and Event Management (SIEM) is software for aggregating logs and events from applications, servers, network equipment, and specialized security equipment such as firewalls or Intrusion Prevention systems (IPS). SIEM offers a unified view of
@CyberRacheal
Cyber_Racheal
1 day
What does SIEM mean? A. System Information and Enterprise Manager B. System Information and Event Manager C. Security Information and Enterprise Manager D. Security Information and Event Manager
0
2
3
@CyberRacheal
Cyber_Racheal
22 hours
Beginner mistakes in cybersecurity👇🏽 Beginner mistakes in cybersecurity I see all the time: 📍Tools before fundamentals Tools change. Foundations don’t. Without OS, networking & security basics, tools feel confusing fast. 📍Certificates over labs Certs get attention.
8
65
251
@CyberRacheal
Cyber_Racheal
1 day
What does SIEM mean? A. System Information and Enterprise Manager B. System Information and Event Manager C. Security Information and Enterprise Manager D. Security Information and Event Manager
73
17
221
@CyberRacheal
Cyber_Racheal
2 days
𝗚𝗼𝗼𝗴𝗹𝗲 𝗖𝗹𝗼𝘂𝗱 Exams👇🏽: Cybersecurity Channel to subscribe to: https://t.co/nqijhV7BnZ •      𝗖𝗦𝗘: https://t.co/DtkAZkNLHu •      𝗣𝗗𝗘: https://t.co/j9mr4sibrx •      𝗣𝗖𝗔: https://t.co/lJeGf62u6C
@CyberRacheal
Cyber_Racheal
3 days
𝗠𝗼𝗿𝗲 Practice Exams You Might Be Interested In👇🏽 •. Cybersecurity Channel: https://t.co/5rhg5Au8dt. •      𝗖𝗘|𝗛 Exams: https://t.co/dTMZCYWqDY •      𝗣𝗠𝗣: https://t.co/mIxFtnJdaW •      𝗖C𝗡𝗔: https://t.co/gO3ohzpfum •      𝗖𝗖𝗡𝗣: https://t.co/Ozdh730nLy
0
22
133
@CyberRacheal
Cyber_Racheal
2 days
Explanation: Simple Mail Transport Protocol (SNMP) is an application layer protocol that operates at level 7. Level 3 corresponds to the network layer. There are no OSI layers above level 7. The number 25 presumably refers to the TCP/IP port of the SMTP protocol. The number
@CyberRacheal
Cyber_Racheal
3 days
The SMTP protocol operates at OSI Level: A. 25 B. 23 C. 35 D. 78
1
5
29
@CyberRacheal
Cyber_Racheal
3 days
IP addresses are binary numbers. Learn how 👇🏽. Cybersecurity YouTube channel for labs: https://t.co/5rhg5AuG31 Subscribe.
4
88
362
@CyberRacheal
Cyber_Racheal
3 days
𝗠𝗼𝗿𝗲 Practice Exams You Might Be Interested In👇🏽 •. Cybersecurity Channel: https://t.co/5rhg5Au8dt. •      𝗖𝗘|𝗛 Exams: https://t.co/dTMZCYWqDY •      𝗣𝗠𝗣: https://t.co/mIxFtnJdaW •      𝗖C𝗡𝗔: https://t.co/gO3ohzpfum •      𝗖𝗖𝗡𝗣: https://t.co/Ozdh730nLy
@CyberRacheal
Cyber_Racheal
4 days
𝗜𝗦𝗔𝗖𝗔 Exams Materials👇🏽: •      𝗖𝗜𝗦𝗠: https://t.co/CM1II4RhKY •      𝗖𝗜𝗦𝗔: https://t.co/NTYuMoOZZg •      𝗖𝗥𝗜𝗦𝗖: https://t.co/rxhTlAYMhB Cybersecurity Youtube channel: https://t.co/nqijhV7BnZ…. Subscribe.
1
46
186
@CyberRacheal
Cyber_Racheal
3 days
The SMTP protocol operates at OSI Level: A. 25 B. 23 C. 35 D. 78
52
5
122
@CyberRacheal
Cyber_Racheal
3 days
Explanation: To apply an access list, the proper command is ip access-group 101 in. • ip access-group 101 in: This is the standard Cisco IOS command used within interface configuration mode to apply an IP access list (ACL) to an interface. •ip access-group: The base command
@CyberRacheal
Cyber_Racheal
4 days
Which command would you use to apply an access list to a router interface? A. ip access-list 101 out B. access-list ip 101 in C. ip access-group 101 in D. access-group ip 101 in
0
5
15
@CyberRacheal
Cyber_Racheal
3 days
Just don’t give up ⬆️ Keep moving.
@sciencegirl
Science girl
4 days
"Success isn't linear" by Yoann Bourgeois Success is not a straight line upwards, it's a journey with many falls, and the strength to get up, no matter how hard the fall. 📹Mathieu Stern.
0
2
4
@CyberRacheal
Cyber_Racheal
4 days
These are 100% FREE Cybersecurity resources with NO paywalls. 👇🏽 Bookmark this. Share this. Use this. • Cybersecurity Youtube channel: https://t.co/nqijhV73yr. • Python for Cybersecurity https://t.co/TzZFWYADoO • CISA – Cybersecurity Training & Exercises
4
94
359
@CyberRacheal
Cyber_Racheal
4 days
𝗜𝗦𝗔𝗖𝗔 Exams Materials👇🏽: •      𝗖𝗜𝗦𝗠: https://t.co/CM1II4RhKY •      𝗖𝗜𝗦𝗔: https://t.co/NTYuMoOZZg •      𝗖𝗥𝗜𝗦𝗖: https://t.co/rxhTlAYMhB Cybersecurity Youtube channel: https://t.co/nqijhV7BnZ…. Subscribe.
@CyberRacheal
Cyber_Racheal
5 days
𝗔𝗪𝗦 Exams👇🏽: •      𝗖𝗖𝗣: https://t.co/zES7mskY8P •      𝗖𝗦𝗔: https://t.co/b3j1kYpM8y •      𝗦𝗖𝗦: https://t.co/JYgSklwztb Cybersecurity Youtube channel: https://t.co/qcYZtRCfEW. Subscribe.
1
56
217
@CyberRacheal
Cyber_Racheal
4 days
Which command would you use to apply an access list to a router interface? A. ip access-list 101 out B. access-list ip 101 in C. ip access-group 101 in D. access-group ip 101 in
10
4
26
@CyberRacheal
Cyber_Racheal
4 days
Explanation: The process of wrapping a packet in a new one to transmit it across a network is known as encapsulation. This is a fundamental concept in networking where data is wrapped with protocol information (headers and sometimes trailers) at each layer of a protocol stack.
@CyberRacheal
Cyber_Racheal
5 days
In ........................ mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A. Tunneling B. Encapsulation C. Both A and B D. None of the above
0
2
19
@CyberRacheal
Cyber_Racheal
5 days
Know what works for you and Do what works for you. Consistency will beats motivation.
3
3
10
@CyberRacheal
Cyber_Racheal
5 days
If only X views could convert to YouTube subscribers 🫩🫠🤣
2
2
7
@CyberRacheal
Cyber_Racheal
5 days
First LinkedIn post of the year. ✨ Let’s start with gratitude and intentions. Last year, I officially began Women in CyberSecurity (WiCyS) mentorship journey, Now I’ve completed 5 fruitful sessions with my mentees. What started as conversations converted into: 📍Building
Tweet card summary image
linkedin.com
First LinkedIn post of the year. ✨ Let’s start with gratitude and intentions. Last year, I officially began Women in CyberSecurity (WiCyS) mentorship journey, Now I’ve completed 5 fruitful sessions...
1
3
28
@CyberRacheal
Cyber_Racheal
5 days
𝗔𝗪𝗦 Exams👇🏽: •      𝗖𝗖𝗣: https://t.co/zES7mskY8P •      𝗖𝗦𝗔: https://t.co/b3j1kYpM8y •      𝗦𝗖𝗦: https://t.co/JYgSklwztb Cybersecurity Youtube channel: https://t.co/qcYZtRCfEW. Subscribe.
@CyberRacheal
Cyber_Racheal
6 days
𝗔𝘇𝘂𝗿𝗲 Exams Materials👇🏽.: •      𝗔𝗭-𝟵𝟬𝟬: https://t.co/3TRxP4U1Hz •      𝗔𝗭-𝟭𝟰𝟬: https://t.co/SbSifwKZTn •      𝗔𝗭-𝟱𝟬𝟬: https://t.co/9f31EjvfB2 •      𝗔𝗭-𝟭𝟬𝟰: https://t.co/2KoMl8JdCe •      𝗠𝗦-𝟵𝟬𝟬: https://t.co/9p6rh6t8Q7 •      𝗦𝗖-𝟵𝟬𝟬:
4
157
872