Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.

Leave a Reply

Your email address will not be published. Required fields are marked *

1,481 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  2. Scenario One
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two
    Weaknesses in the platform’s security practices.

  3. Scenario One
    The username and password of all of the hotel’s employees.

    Scenario Two
    Weaknesses in the platform’s security practices.

  4. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  5. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  6. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  7. Scenario 1

    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Scenario 3

  8. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  9. Scenario 1:-The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  10. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  11. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  12. Answer to Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Answer to Scenario 2: Weaknesses in the platform’s security practices.

  13. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  14. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s Security practices

  15. Scenario 1: the hackers took;
    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Scenario 2: the hackers exploits;

    Weaknesses in the platform’s security practices.

  16. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  17. Question 1:The card payment information of over three million guests., The names, email address and phone numbers of over three million hotel guests and The username and password of all of the hotel’s employees.

    Question 2: Weaknesses in the platform’s security practices.

  18. Question 1
    The names, email address and phone numbers of over three million hotel guests.
    Question 2
    Weaknesses in the platform’s security practices.

  19. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scénario 2
    Weaknesses in the platform’s security practices.

  20. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    1. Weaknesses in the platform’s security practices.
    By: Olalekan

  21. Day 2 Answers – Cyber Attackers

    1. Gray hat
    2. Black hat.
    3. White hat
    4.Black hat
    5. White hat.

    1. The names, email address and phone numbers of over three million hotel guests.
      Weaknesses in the platform’s security practices.

  22. Scenario 1. The hotel chain’s reputation.

    Scenario 2. Weaknesses in the platform’s security practices.

  23. Scenario 1 (The Hotel)

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 (e-learning platform at risk)

    1. Weaknesses in the platform’s security practices.

  24. Scenario 1
    The names, email addresses and phone numbers of over 3 million hotel people

    Scenario 2

    Weakness in platform security practices

  25. Scenario 1
    Personal details of hotel guests which includes emails, names and addresses

    Scenario 2
    Security platform not safe but weak

  26. Scenario 1 answer:

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer:

    Weaknesses in the platform’s security practices.

  27. Scenario 1 Answer:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer:
    Weaknesses in the platform’s security practices.

  28. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  29. DORIS OGOCHUKWU
    1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

    1. Day 1

      – Scenario 1
      The names, email addresses, and phone numbers of over three million hotel guests.

      – Scenario 2
      Weaknesses in the platform’s security practices.

  30. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  31. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

  32. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  33. 1 The names, email address and phone numbers of over three million hotel guests.

    2 Weaknesses in the platform’s security practices.

  34. 1. The username and password of all of the hotel’s employees.

    2. Weaknesses in the platform’s security practices.

  35. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

    Bolaji
    Group 2

  36. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

  37. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

  38. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

  39. Module 1

    Scenario 1 (The Hotel)
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 (The E-learning platform @ risk)

    Weaknesses in the platform’s security practices.

  40. Day 1

    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  41. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  42. Day 1

    Scenario 2
    The names, email addresses, and, phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  43. Day 1

    Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  44. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Module 2

    1. White Hat
    2. Black Hat
    3. Gray Hat
    4. Black Hat
    5. White Hat

  45. Day 1

    The card payment information of over three million guests.

    Question 2
    Weaknesses in the platform’s security practices.

  46. Scenario 1

    The card payment information of over three million guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  47. The username and password of all of the hotel’s employees.

    Taking advantage of student information not being correctly validated on the platform.

  48. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

    1. Day 1
      1. The names, email address and phone numbers of over three million hotel guests.

      2.Weaknesses in the platform’s security practices.

  49. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  50. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  51. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  52. Cyber attackers: What color is my hat
    1. Gray hat
    2. Black hat
    3. White hat
    4. Black hat
    5. White hat

  53. Osemene Nonyelum Esther.
    CYBER ATTACKS.

    QUESTION I
    White hat.

    QUESTION 2
    Black hat.

    QUESTION 3
    Gray hat.

    QUESTION 4
    Black hat.

    QUESTION 5
    White hat.

  54. Scenario 1:
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  55. 1)The names, email address and phone numbers of over three million hotel guests

    2)Weaknesses in the platform’s security practices.

  56. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  57. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  58. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2: Weaknesses in the platform’s security practices

  59. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2: Weaknesses in the platform’s security practices.

  60. Scenario 1

    3. The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  61. SCENARIO 1:
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2:
    Weaknesses in the platform’s security practices

  62. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  63. Scenario 1

    The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  64. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  65. Scenerio 1
    The names, email addresses and phone number of I’ve three million guest.

    Scenerio 2
    Weaknesses in the platforms security practices

  66. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  67. Scenario 1
    The card payment information of over three million guests.
    The names, email addresses and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  68. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices.

  69. 1.Taking advantage of student information not being correctly validated on the platform.

    2.The names, email address and phone numbers of over three million hotel guests.

  70. Scenario 1
    The username and password of all of the hotel’s employees.
    The names, email address and phone numbers of over three million hotel guests.

  71. Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform.

  72. The username and password of all of the hotel’s employees.
    The names, email address and phone numbers of over three million hotel guests.

  73. Scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  74. Scenario 1

    The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  75. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  76. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  77. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  78. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

    1. SCENARIO 1:
      The names, email address and phone numbers of over three million hotel guests.

      SCENARIO 2:
      Weaknesses in the platform’s security practices

  79. Scenario 1- The names, email address and phone numbers of over three million hotel guests.
    Scenario 2- Weaknesses in the platform’s security practices.

  80. Senerio 1:
    The names, email address and phone numbers of over three million hotel guests.

    Senerio 2:
    Weaknesses in the platform’s security practices.

  81. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  82. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  83. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  84. Scenario 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  85. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  86. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  87. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform security practices.

  88. Scenario 1 answer
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 answer
    Weaknesses in the platform’s security practices.

  89. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  90. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  91. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  92. Scenerio 1 Answer:
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2 Answer:
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform

  93. The hotel chain’s reputation.
    The names, email address and phone numbers of over three million hotel guests.

  94. SCENERIO2: Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  95. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  96. Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform.
    Related

  97. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  98. 1. Names, email addresses and phone numbers of over three million hotel guests

    2.The hotel chain’s reputation.
    ( this includes the credibility and security reliability of the hotel)

  99. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  100. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  101. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  102. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  103. Scenerio I
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Taking advantage of student information not being correctly validated on the platform.

  104. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  105. Scenero 2

    1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

  106. 1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

  107. 1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

    3

  108. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  109. 1. The username and password of all of the hotel’s employees.
    2. Weaknesses in the platform’s security practices.

  110. 1. The card payment information of over three million guests.
    2. Weaknesses in the platform’s security practices.

  111. 1. The username and password of all of the hotel’s employees
    2. Weaknesses in the platform’s security practices.

  112. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  113. Scenario 1.The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  114. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  115. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  116. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  117. scenario 1: names, email address and phone numbers of over three million hotel guests.

    scenario 2: weaknesses in the platform’s security practices

  118. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  119. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  120. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  121. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  122. 2-The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  123. 1 The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  124. 1
    The username and password of all of the hotel’s employees
    2
    Weaknesses in the platform’s security practices.

  125. The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2
    Weaknesses in the platform’s security practices.

  126. Scenario 1
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    1. Weaknesses in the platform’s security practices.

  127. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  128. 1. The card payment information of over three million guests.
    Scenario 2.
    2. Weaknesses in the platform’s security practices

  129. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  130. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  131. The names, email address and phone numbers of over three million hotel guests .
    Weaknesses in the platform’s security practices.

  132. Scenerio1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio2
    Weaknesses in the platform’s security practices.

  133. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  134. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  135. scenario 2
    Weaknesses in the platform’s security practices.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

    Taking advantage of student information not being correctly validated on the platform.

  136. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  137. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  138. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  139. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  140. scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    scenario 2
    Weaknesses in the platform’s security practices.

  141. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  142. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  143. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  144. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  145. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  146. Scenario 1
    -The hotel chain’s reputation.

    Scenario 2
    -Weaknesses in the platform’s security practices.

  147. The names, email address and phone numbers of over three million hotel guests.
    scenario 2
    Weaknesses in the platform’s security practices.

  148. Scenario 1:
    -The card payment information of over three million guests.
    -The hotel chain’s reputation.
    Scenario 2:
    -Weaknesses in the platform’s security practices.

  149. Scenario 1
    The hotel chain’s reputation
    Scenario 2
    Bypassing the platform’s access control methods.

  150. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  151. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  152. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Scenario 2
    Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests

      Scenario 2.
      Weaknesses in the platform’s security practices.

  153. Scenario 1
    The username and password of all the hotel’s employees

    Scenario 2
    Weakness in the platform’s security

  154. Scenario 1:- The card payment information of over three million guests.

    Scenario 2:- Weaknesses in the platform’s security practices.

  155. for the first senerio they took the hotel chain’s reputation. then for the second senerio the exploited the Weaknesses in the platform’s security practices

  156. SCENARIO 1
    The username and password of all of the hotel’s employees.

    SCENARIO 2
    Bypassing the platform’s access control methods.

  157. The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  158. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  159. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  160. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  161. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  162. 1-The names, email address and phone numbers of over three million hotel guests.

    2-Weaknesses in the platform’s security practices.

  163. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Bypassing the platform’s access control methods.

  164. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  165. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  166. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  167. The names, email address and phone numbers of over three million hotel
    Weaknesses in the platform’s security practices.

    Weaknesses in the platform’s security practices.

  168. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  169. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  170. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  171. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  172. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  173. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  174. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  175. Senerio 1- The username and password of all of the hotel’s employees.

    Senerio 2- Weaknesses in the platform’s security practices.

     

  176. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  177. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

    1. 1.Gray hat attackers
      2. Black hat attackers
      3. White hat attackers
      4. Black hat ATTACKERS
      5. White hat attackers

  178. Scenario 1 – The card payment information of over three million guests

    Scenario 2- Weaknesses in the platform’s security practices.

  179. Scenario 1 – The username and password of all of the hotel’s employees.

    Scenario 2 – Weaknesses in the platform’s security practices.

  180. SCENARIO 1 The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2 Weaknesses in the platform’s security practices.

  181. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  182. The card payment information of over three million guests.

    Scenario 2
    Bypassing the platform’s access control methods

  183. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.

    Taking advantage of student information not being correctly validated on the platform.

  184. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  185. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  186. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  187. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  188. Question 1 answer – The names, email address and phone numbers of over three million hotel guests.

    Question 2 answer – Weaknesses in the platform’s security practices.

  189. Question 1 answer – The names, email address and phone numbers of over three million hotel guests.

    Question 2 answer- Weaknesses in the platform’s security practices.

    Bypassing the platform’s access control methods.

  190. Senerio 1: B. The names, email address and phone numbers of over three million hotel guests

    Senerio 2: Weaknesses in the platform’s security practices.

  191. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  192. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  193. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  194. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    Weaknesses in the platform’s security practices.

  195. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  196. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  197. Scenario 1:
    1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Hotel chain reputation

    Scenario 2
    1. Weaknesses in the platform’s security practices

  198. Scenerio 1 :
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenerio 2 :
    Weaknesses in the platform’s security practices.

  199. Scenario 1.
    The card payment information of over three million guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  200. Scenario 1:
    3. The hotel chain’s reputation.

    Scenario 2:
    1. Weaknesses in the platform’s security practices.

  201. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  202. The card payment information of over three million guests.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  203. Secenerio 1:
    3. The hotel chain’s reputation.

    Secenerio 2:
    1. Weaknesses in the platform’s security practices.

  204. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  205. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  206. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  207. The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices.

  208. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  209. Hi, Am at the first stage of Cyber Security Beginners course quiz, but I cant find the questions to the answer written, I need help with where to find the question to the answers pls.

  210. 1. The names, email address and phone numbers of over three million hotel guests.

    2 Weaknesses in the platform’s security practices.

  211. Scenario 1
    Ans: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Ans: Weaknesses in the platform’s security practices.

  212. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  213. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  214. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  215. Scenario 1.Names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  216. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 1: Taking advantage of student information not being correctly validated on the platform.

  217. Scenario 1. names, email address and phone numbers of over three million hotel guests
    Scenario 2.Weaknesses in the platform’s security practices.

  218. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  219. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  220. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2: Student information left exposed

  221. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Bypassing the platform’s access control methods.

  222. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Bypassing the platform’s access control methods.

  223. The names, email address and phone numbers of over three million hotel guests
    The hotel chain’s reputation.

    Bypassing the platform’s access control methods

    Weaknesses in the platform’s security practices

  224. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  225. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  226. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practi

  227. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices

  228. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  229. Senerio 1: The names, email address and phone numbers of over three million hotel guests.

    Senerio 2: Weaknesses in the platform’s security practices.

  230. Scenario 1

    Answer: The hotel chain’s reputation.

    Scenario 2

    Answer: Weaknesses in the platform’s security practices.

  231. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:

    Weaknesses in the platform’s security practices

  232. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practice.

  233. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  234. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.