Jump to content

Mugabe

Members
  • Posts

    35
  • Joined

  • Last visited

2 Followers

Recent Profile Visitors

703 profile views

Mugabe's Achievements

Rising Star

Rising Star (9/14)

  • Very Popular Rare
  • Collaborator
  • One Year In
  • Dedicated
  • Conversation Starter

Recent Badges

1.4k

Reputation

  1. [CBT Nuggets] Certified Associate in Python Programming freecoursesonline.me-cbtnugget-certified-associate-in-python-programming.torrent
  2. 7.2 NSE5_FMG-7.2 Check most voted answers.I wrote today and passed NSE5_FMG_7_2.pdf
  3. Good day,Im looking for Fortinet NSE5_FMG-7.2 Exam Dump (FortiManager)
  4. Hi guys,im looking for Ethical Hacking Essentials Dump
  5. Explore ESP32 Micropython. Python Coding,...2021.pdfBook: Explore ESP32 Micropython I also have so videos will share once Im done uploading
  6. Mugabe

    COBIT

    COBIT 2019 Books Cobit-2019-toolkit.zip COBIT 2019 Implementation Guide.pdf COBIT 2019 Foundation Study Material.pdf COBIT-2019 Framework (Governance and Management Objectives).pdf COBIT-2019 Framework (Introduction and Methodology).pdf cobit 2019 .pdf COBIT 2019 Design Guide.pdf
  7. Data Center Design and Implementation Best Practices Data Center Operations and Maintenance Best Practices 651882829_BICSI009(2019).pdf 1600545898_BICSI002-2019.pdf
  8. I wrote yesterday morning and here is my feedback: The exam had *104* questions. The dump should be enough for you to pass. Some of the Questions were re-phrased. Just understand the concepts. For new questions that came ,this is all i can remember. #There was a question with a screenshot showing Linux cli sshd (ssh deamon)logs of a user connecting to a server and you’ll be asked to identify source port and protocol. #Another Question was about Shellshock Vulnerability #Definition for patch management choosing answers from a list provided. #You should be able to identify ICMP tunnelling -there was a Screenshot where they wanted to know the technique being used. #They also gave a scenario about A user who logged into a server and changed privileges, wanted to know the type of attack which was used. A)Sql injection B)X-site scripting B)Privilege Escalation.. etc
  9. [Hidden Content] Cisco is offering for free at the moment.Use above link
  10. some answers are not correct [Hidden Content] HIDDEN CONTAIN MISSING POST IN WRONG SECTION NO REQUEST FORUM FINAL WARNING
  11. Guys i was informed this is the latest. [Hidden Content] YOU HAVE POST ON NO REQUEST FORUM HIDDEN CONTAIN MISSING DIRECT ATTACHING TO CC IS VIOLATING CC RULES BANNED FOR 5 days
  12. Most answers are wrong, rely on community votes. [Hidden Content] HIDDEN CONTAIN MISSING REAL THE RULES BEFORE POSTING ORELSE YOU WILL GET BANNED DO NOT PUT DIRECT PDF ATTACHMENTS UPLOAD ANYWHERE AND SHARE THE LINKS
×
×
  • Create New...