Discussion Assignment Cyber Security Course- What was Taken?

Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.
Discussion Assignment Cyber Security Course- What was Taken?

Leave a Reply

Your email address will not be published. Required fields are marked *

2,569 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.
    Reply

  2. Scenario 1
    The names, email address and  phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  3. scenario 1
    The names, email address and phone number of over three million hotel guest
    Scenario 2
    weakness in the platform’s security practices

  4. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Bypassing the platform’s access control methods.

  5. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  6. senario 1
    The hotel chain’s reputation

    Senario 2
    Weaknesses in the platform’s security practices.

  7. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

    Reply

  8. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  9. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Bypassing the platform’s access control methods.
    Weaknesses in the platform’s security practices.

  10. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  11. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  12. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  13. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices

  14. Weaknesses in the platform’s security practices
    Taking advantage of student information not being correctly validated on the platform

  15. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Taking advantage of student information not being correctly validated on the platform.

  16. The names, email address and  phone numbers of over three million hotel guests.The hotel chain’s reputation.

    Weaknesses in the platform’s security practices.

  17. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  18. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
    Scenario2- Taking advantage of student information not being correctly validated on the platform.

  19. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario2- Taking advantage of student information not being correctly validated on the platform.

  20. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  21. Scenario 1: Gray hat
    Scenario 2: Black hat
    Scenario 3: White hat
    Scenario 4: Black hat
    Scenario 5: White hat

  22. Scenario 1: The names, email and phone numbers of over three million guests
    Scenario 2: Weakness in the platform security platform

  23. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  24. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  25. Scenario1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  26. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Taking advantage of student information not being correctly validated on the platform.

  27. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Taking advantage of students information not correctly validated on the platform

  28. Scenario 1: The names email and phone numbers of over three million guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  29. In scenario 1–
    The names, email address and phone numbers of over three million hotel guests.

    In Scenario 2– Weaknesses in the platform’s security practices
    —Bypassing the platform’s access control methods

  30. In scenario 1: The Hackers took
    – the names, email address and phone numbers of over three million hotel guests.
    In scenario 2: Weaknesses in the platform’s security practices.

  31. Scenario 1:The names, email address and  phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  32. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

  33. Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  34. scenario 1: The names, email address and phone numbers of over three million hotel guests.
    scenario 2: Weaknesses in the platform’s security practices.

  35. SCENERIO 1

    2. The Names, Email Address and Phone numbers of over 3 million hotel guests
    3. The hotel chains reputation

    SCENERIO 2

    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  36. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Weaknesses in the platform’s security practices.

  37. Scenario 1:
    The hotel chain’s reputation.
    Scenario 2;
    Weaknesses in the platform’s access control methods

  38. Scenario 1:
    The hotel chain’s reputation.
    Scenario 2:
    Weaknesses in the platform’s security practices

  39. SCENERIO 1- The names, email address and phone numbers of over three million hotel guests.
    SCENERIO 2- Weaknesses in the platform’s security practices.

  40. SCENARIO 1 : The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  41. Scenario 1:
    1. The hotel chains reputation.

    Scenario 2:
    1. On the weaknesses in the platform’s security practices
    2. Taking advantage of student’s information not being correctly validated on the platform.

    1. SCENARIO 1 : The names, email address and phone numbers of over three million hotel guests.

      SCENARIO 2: Weaknesses in the platform’s security practices.

  42. In Scenario 1 : The hackers took
    1. The names, email address and phone numbers of all three million hotel guest.
    2. The hotel chains reputation.

    While in Scenario 2: The hackers exploited
    1. On the weaknesses in the platform’s security practices
    2. Taking advantage of student’s information not being correctly validated on the platform.

  43. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  44. Scenario 1: The hotel chain’s reputation.
    Scenario 2: Weaknesses in the platform’s security practice.

  45. Scenario I
    The names,email addresses and phone numbers of over three million hotel guests
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  46. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario-2
    Taking advantage of student information not being correctly validated on the platform.

    1. 1) The names, email address and phone numbers of over three million hotel guests.
      2)Weaknesses in the platform’s security practices.

  47. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  48. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    SENARIO 2

    Weaknesses in the platform’s security practices.

  49. SCENARION 1
    The hackers took the names, email address and phone numbers because their personal information was exposed which the hotel confirmed.

    SCENARIO 2
    Weaknesses in the platform’s security practices because leaving a cloud database publicly accessible is a major security misconfiguration.

    Thanks

  50. SCENARION 1
    The hackers took the names, email address and phone numbers of over three million hotel guests because their personal information were exposed.

    SCENARION 2

  51. The names, email addresses and phone numbers of over three million hotel guests
    Extracting information when the volume of student data exceeds the storage capacity of the platforms memory buffer

  52. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  53. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  54. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  55. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  56. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  57. 1. The hotel chain’s reputation.
    2. Weaknesses in the platform’s security practices.

  58. 1
    The names, email address and phone numbers of over three million hotel guests.
    2
    Weaknesses in the platform’s security practices

  59. Senerio 1
    The username and password of all of the hotel’s employees.

    Senerio 2
    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  60. Scenerio 1
    2. The Names, Email Address and Phone numbers of over 3 million hotel guests
    3. The hotel chains reputation

    Scenerio 2
    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  61. what color is my hat Answer
    1. Gray hat attackers
    2. Black hat attackers
    3.Gray hat attackers
    4. Black attackers
    5. white hat attackers

  62. scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenrio 2
    Weaknesses in the platform’s security practices.

  63. 2. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  64. Scenario 1
    1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

    1. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
      Scenario 2:Weaknesses in the platform’s security practices.

  65. DAY 2
    1. White hat hackers
    2. black hat hackers
    3. gray hat hackers
    4. black hat hackers
    5. white hat hackers

  66. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  67. Answers to what colors is my hat
    1. white hat hacker
    2. Black hat hacker
    3. Gray hat hacker
    4. Black hat hacker
    5. White hat hacker

  68. Day 2 discussion answer
    1. Gray hat hackers
    2. Black hat hackers
    3. White hat hackers
    4. Gray hat hackers
    5. Black hat hackers

  69. Scenario 1: The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices.

  70. .Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  71. Scenario 1. The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

    1. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

      Scenario 2: Weakness in the platform’s security practices.

  72. DAY 1
    1. The hotel chain’s reputation
    2. Weaknesses in the platform’s security practices.

    DAY 2
    1. White hat
    2. Black hat
    3. White hat
    4. Gray hat
    5. White hat

  73. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  74. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Bypassing the platform’s access control methods

  75. BigZion72
    Day1
    Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2: Weaknesses in the platform’s security practices.

  76. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

      1. Scenario 1: The card payment information of over three million guests.

        Scenario 2:Weaknesses in the platform’s security practices.

  77. Scenario 1
    They took the names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  78. Scenario 1
    Ans: The names , email address and phone number of over 3 million guests
    Scenario 2
    And: Weaknesses in the platform security practices

    1. Q1: the name email address and phone number of over three million guests
      Q2: weaknesses in the platform security practices

  79. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    ‎Scenario 2: Weaknesses in the platform’s security practices.

  80. Day 1

    Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  81. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  82. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  83. ITEM OLUWATOYIN COMFORT
    Day 1
    Assessment question 1:
    The names, email address and phone numbers of over three million hotel guests

  84. Senerio 1
    The card payment information of over three million guests.
    Senerio 2
    Weaknesses in the platform’s security practices.

  85. 1. The card payment information of over three million guests.

    2. Weaknesses in the platform’s security practices.

  86. Senerio 2

    1. Weaknesses in the platform’s security practices.
    2. Bypassing the platform’s access control methods.
    3. Taking advantage of student information not being correctly validated on the platform.

  87. Senerio 1
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.
    3. The hotel chain’s reputation.

  88. Scenario 1: The names, email and address and phone numbers of over three million hotel guest
    Scenario 2: weaknesses in the platform’s security practices.

  89. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  90. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  91. SCENERIO 1-The names, email address and phone numbers of over three million hotel guests.
    SCENERIO 2-Weaknesses in the platform’s security practices.

  92. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  93. Scenario 1
    The username and password of all of the hotel’s employees

    Scenario 2 Weaknesses in the platform’s security practices

  94. SCENARIO 1; The names, email and address and phone numbers of over three million hotel guests.
    SCENARIO 2; Weakness in the platform’s security practices.

  95. SCENARIO 1; The names, email address and phone numbers of over three million hotel guest

    SCENARIO 2; Weaknesses in the platform’s security practices.

  96. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  97. Scenario 1: The names email address and phone numbers of over three million hotel guests
    Scenario 2: Weakness in the the platform security practices

  98. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2:Weaknesses in the platform’s security practices.

  99. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  100. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.
      Scenario 2
      Weaknesses in the platform’s security practices.

  101. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  102. Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer: Weaknesses in the platform’s security practices.

  103. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  104. 1. The card payment information of over three million guests.
    2. Bypassing the platform’s access control methods.

  105. Answers;
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  106. Scenerio 1-The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2-Weaknesses in the platform’s security practices.

  107. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  108. SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENERIO 2;Weaknesses in the platform’s security practices.

  109. The hotel chain’s reputation
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  110. SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENERIO 2;Weaknesses in the platform’s security practices.

  111. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices.

  112. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  113. The card payment information of over three million guests.
    Misconfigured cloud database or lack of proper access

  114. Answers
    Q1. The card payment information of over three million guests.
    Q2. Weaknesses in the platform’s security practices

  115. Answers
    Q1. The card payment information of over three million guests.
    Q2. Weaknesses in the platform’s security practices

  116. 1.The names, email address and phone numbers of over three million hotel guests
    2.Weaknesses in the platform’s security practices.

  117. 1 scenario -:The names, email address and phone numbers of over three million hotel guests.

    2:Weaknesses in the platform’s security practices.

  118. `1. The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    2. Weaknesses in the platform’s security practices.

  119. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  120. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  121. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  122. Scenario one: The names, email address and phone numbers of over three million hotel guests.

    Scenario two: Weaknesses in the platform’s security practices.

  123. 1: The names, email address and phone numbers of over three million hotel guests.

    2:Weaknesses in the platform’s security practices.

  124. scenerio 1
    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2
    Weaknesses in the platform’s security practices

  125. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  126. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  127. Scenario 1:The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platform’s security practices.

  128. Scenario one:The card payment information of over three million guests
    Scenario two:Weaknesses in the platform’s security practices

  129. Augustine Anuoluwapo
    Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  130. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  131. Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer: Weaknesses in the platform’s security practices

  132. 1.The card payment information of over three million guests.
    2.Weaknesses in the platform’s security practices.

  133. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices

  134. Scenario 1: a) The names, email addresses and phone numbers of over 300million guests.

    b) The hotel chains reputation

    Scenario 2: Weaknesses in the platforms security practices.

  135. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  136. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  137. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  138. senario 1; The username and password of all of the hotel’s employees.

    senario 2; Weaknesses in the platform’s security practices.

  139. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

    1. scenario1. The names, email address and phone numbers of over three million hotel guests.
      scenario2. weakness in the platform’s security practices.

  140. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  141. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  142. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  143. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  144. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  145. Day 2,
    Question 1: Grey hat
    Question 2: Black hat
    Question 3: White hat
    Question 4: Black hat
    Question 5: White hat

  146. Question 1: The username and password of all of the hotel’s employees.

    Question 2:Weaknesses in the platform’s security practices.

  147. Question 1: The names, email address and phone numbers of over three million hotel guests

    Question 2: Weaknesses in the platform’s security practices.

  148. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  149. Taking advantage of student information not being correctly validated on the platform.
    The names, email address and phone numbers of over three million hotel guests

  150. The first answer is the names,email address and phone number of over three million hotel guests.

    Scenario number 2 is weakness in the platform’s security practices.

  151. The names, email address and phone numbers of over three million hotel guests.
    2.
    Weaknesses in the platform’s security practices.

  152. Scenario 1.
    The card payment information of over three million guests.
    Scenario 2.
    Weaknesses in the platform’s security practices.

  153. (1). The names, email address and phone numbers of over three million hotel guests.

    (2). Weakness in the platforms practices.

  154. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  155. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platforms security practices.

  156. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  157. Scenario 1 : The card payment information of over three million guests

    Scenario 2: weakness in the platform’s security practices

  158. Scenario 1.
    The names, email addresses and phone numbers of over 3 million hotel guests .
    Scenario 2.
    Weaknesses in the platform’s security practices.

  159. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  160. Scénario 1
    Les noms, adresses e-mail et numéros de téléphone de plus de trois millions de clients d’hôtels.
    Scénario 2
    Faiblesses dans les pratiques de sécurité de la plateforme.

  161. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  162. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  163. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Taking advantage of student information not being correctly validated on the platform.

  164. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  165. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  166. Scenario 1

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Taking advantage of student information not being correctly validated on the platform.

  167. The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests

  168. The names, email address and phone numbers of over three million hotel guests and the hotel chains reputation

    Weaknesses in the platforms security practices

  169. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  170. Scenario 1
    The username and Password of all the hotel’s employees

    Scenario 2
    Weaknesses in the platform’s security practices

  171. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  172. (23/11/2024)
    Day 2: cohort 8 Assessment answers
    Cyber Attackers

    1.Gray hat
    2.Black hat
    3.White hat
    4.Black hat
    5. White hat

  173. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  174. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  175. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  176. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  177. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  178. Scenario 1:
    The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

    1. Day 2
      1. Gray hat attacker
      2.Black hat attacker
      3. White hat attacker
      4.Black hat attacker
      5. White hat attacker

  179. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  180. Scenario 1
    1. The card payment information of over three million guests.
    Scenario 2
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  181. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  182. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  183. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Taking advantage of student information not being correctly validated on the platform.

  184. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  185. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practice

  186. Weaknesses in the platform’s security practices. For senerio 2

    The username and password of all of the hotel’s employees. For senerio 1

  187. *Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  188. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  189. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  190. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  191. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  192. Scenario 1 answer
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

    1. Scenario number 1 is the names,email address and phone number of over three million hotel guests.

      Scenario number 2 is weakness in the platform’s security practices.

  193. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  194. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    Weaknesses in the platform’s security practices.

  195. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices.

  196. 1. The names, email address and phone numbers of over three million hotel guests.

    2 Taking advantage of student information not being correctly validated on the platform.

  197. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  198. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  199. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  200. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  201. Scenario 1
    Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Answer: Weaknesses in the platform’s security practices.

  202. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  203. Scenario 1: The card payment information of over three million guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  204. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

    Scenario 2-Weaknesses in the platform’s security practices.

  205. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.
     

  206. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  207. Case 1 _ The names, email address and phone numbers of over three million hotel guests.

    Case 2 _ weaknesses in the platform’s security practices

  208. * The names, email address and phone numbers of over three million hotel guests.

    *Weaknesses in the platform’s security practices.

  209. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  210. Scenario 1 The username and password of all of the hotel’s employees.
    Scenario 2 Weaknesses in the platform’s security practices.

  211. Senerio 1- the names, email address and phone numbers of over 3 million hotel guests

    Senerio 2- weakness in the platforms security practices

  212. Scenerio 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  213. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  214. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2: Weaknesses in the platform’s security practices.

  215. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  216. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  217. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests
    SCENERIO 2: Weaknesses in the platform’s security practices.

  218. SCENARIO 1: The names, email addresses and phone numbers of over three million hotel guests

    SCENARIO 2: Weaknesses in the platform’s security practices.

  219. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENERIO 2: Weaknesses in the platform’s security practices.

  220. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2

    Weaknesses in the platform’s security practices.

  221. Scenario 1
    .The hotel chain’s reputation.
    Scenery 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  222. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  223. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  224. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods

  225. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  226. 1a. The names, email, address and phone number of over 3 million guest
    B. Hotel chains reputation.
    2. Weakness in the platforms security practices

  227. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  228. 1.) The card payment information of over three million guests.
    2.) Weaknesses in the platform’s security practices.

  229. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weakness in the platforms security practice

  230. 1.The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  231. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  232. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  233. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  234. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly v

  235. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly validated on the platform.

  236. The names, email address and phone numbers of over three million hotel guests.
    Taking advantage of student information not being correctly validated on the platform.

  237. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  238. Question 1
    The names, email address and phone numbers of over three million hotel guests.
    Question 2
    Weaknesses in the platform’s security practices.

  239. Question 1. The username and password of all of the hotel’s employees.
    Question 2. Weaknesses in the platform’s security practices.

  240. Question 1. The names, email address and phone numbers o

    Question 2. Weaknesses in the platform’s security practices.

  241. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  242. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  243. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  244. The names, email address and phone numbers of over three million hotel guests.

    Bypassing the platform’s access control methods

  245. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  246. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    White hat
    Black hat
    White hat
    Black hat
    Grey/White hat

  247. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  248. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  249. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2
    Weaknesses in the platform’s security practices.

  250. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    1. Scenario 1
      Weaknesses in the platform’s security practices.
      Scenario 2
      The names, email address and phone numbers of over three million hotel guests.

  251. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  252. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  253. 1. Weaknesses in the platform’s security practices.
    2.The card payment information of over three million guests.

  254. 1.Weaknesses in the platform’s security practices.

    2.The card payment information of over three million guests.

  255. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of students information not being correctly validated on the platform.

  256. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  257. The hotel chain’s reputation.

    memory buffer.

    Taking advantage of student information not being correctly validated on the platform.

  258. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  259. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  260. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  261. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  262. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  263. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  264. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  265. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  266. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  267. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  268. 1.The name,email address and phone number of over 3 million guest
    2.Weaknesses in the platform’s security practices.

  269. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  270. 1. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  271. Scenario 1 ;The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 ;Weaknesses in the platform’s security practices.

  272. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  273. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  274. Scenario One;
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two;
    Weaknesses in the platform’s security practices.

  275. Day 1
    The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  276. Scenario 1
    It’s safe to say they took:
    The card payment information of over three million guests.

     

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  277. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  278. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  279. Day 1
    scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  280. day 1
    scenario 1.
    2. the names, email address and phone numbers of over three million guests
    scenario 2.
    weaknesses in the platform’s security practices

  281. DAY 2
    Answers to today’s questions
    1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    Ans-White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    Ans-Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Ans-White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    Ans-Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    Ans-White hat

  282. Day 2 answers:
    . After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    This attacker’s job is to identify weaknesses in a company’s computer system.

    White hat

    This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Gray hat

    While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    White hat

  283. Scenario 1 :
    The username and password of all of the hotel’s employees.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  284. Scenario 1 :

    The username and password of all of the hotel’s employees.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  285. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  286. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  287. scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2, Taking advantage of student information not being correctly validated on the platform

  288. Scenario 2
    Weaknesses in the platform’s security practices.
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

  289. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  290. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  291. Scenario 1
    The card payment information of over three million guests.
    Scenario 2

    Bypassing the platform’s access control methods.

  292. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  293. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  294. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices

  295. Scenario One: The names, email addresses and phone numbers of over three million hotel guests
    Scenario two: Weaknesses in the platform’s security practices

  296. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  297. Scene 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  298. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  299. Scenario 2:
    1. Weaknesses in the platform’s security practices.
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    3. Bypassing the platform’s access control

  300. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  301. 1.The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  302. In the first scenario: The hotel chain’s reputation.
    In the second scenario: Weaknesses in the platform’s security practices.

    1. Scenario 1:
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2:
      Weaknesses in the platform’s security practices.

  303. In the first scenario, The names, email address and phone numbers of over three million hotel guests.
    The second scenario is Weaknesses in the platform’s security practices.

  304. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Bypassing the platform’s access control methods.

  305. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  306. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  307. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2:Weaknesses in the platform’s security practices

  308. Scenario 1: The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platform’s security practices.

  309. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  310. 1. The names, email address and phone numbers of over three million hotel guest
    2. Weaknesses in the platform’s security practices

  311. SCENARIO 1- The names, email address and phone numbers of over three million hotel guests
    SCENARIO 2- Weaknesses in the platform’s security practices.

  312. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  313. SCENARIO 1 – Over three million hotel guests’ names, email addresses, and phone numbers.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  314. SCENARIO 1 – The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  315. Scene 1 The names, email address and phone numbers of over three million hotel guests.
    Scene 2 Weaknesses in the platform’s security practices.

  316. Scene 1:
    The names, email address and phone numbers of over three million hotel guests

    Scene 2:
    Weaknesses in the platform’s security practices.

  317. 1). The names, email address and phone numbers of over three million hotel guests.

    2). Weakness in the platform’s security practices.

  318. Scenario 1:
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  319. Scenario 1. The username and password of all of the hotel’s employees.

    Scenario 2Weaknesses in the platform’s security practices.

  320. Scenario 1
    The names,  email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  321. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  322. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  323. SCENERIO 1
    2. The names, email address and phone numbers of over three million hotel guests

    SCENERIO 2
    Weaknesses in the platform’s security practices.

  324. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  325. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  326. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices

  327. Scenario 1.

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  328. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  329. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  330. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  331. Ofoche Stanley cohort 7 team 5
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  332. Scenario 1. The card payment information of over three million guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  333. scenario 1: The names, email address and phone numbers of over three million hotel guests.

    scenario 2: Weaknesses in the platform’s security practices.

  334. Correction to scenario 2:
    The correct answer is-
    weaknesses in the platforms security practices
    Since they admitted leaving all the student information on a publicly accessible cloud service.

  335. Prisca Ifediba Alachebe- Team 3
    Scenario 1- answer is The names, email address and phone numbers of over three million hotel guests.

    Since the hotel is sure that the financial information of the clients are not affected.

    Scenario 2. Answer-
    Taking advantage of student information not being correctly validated on the platform.

    Since the majority of hacked accounts are minors, they might not have properly validated their account details, therefore exposing them to hack attacks.

  336. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

  337. 1)The names, email address and phone numbers of over three million hotel guests.
    2)Weaknesses in the platform’s security practices.

  338. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platforms security practices

  339. 1st scenario: The names, email address and phone numbers of over three million hotel guests.

    2nd Scenario: Weaknesses in the platform’s security practices.

  340. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  341. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  342. Scenario 1
    Ans. 2.The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Ans. Weaknesses in the platform’s security practices.

  343. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  344. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  345. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation

  346. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  347. Day 1
    Scenario 1

    The names, email address and phone numbers of over three

    Scenario 2

    Weaknesses in the platform’s security practices

  348. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platforms security practices.

  349. Scenario 1

    The username and password of all of the hotel’s employees.

    Scenario 2

    Weaknesses in the platform’s security practices.

  350. 1, 1he names, email address and phone numbers of over three million hotel guests.

    2,Weaknesses in the platform’s security practices.

  351. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  352. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  353. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  354. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  355. Scenario 1:
    numbers of over three million hotel guests.
    3. The hotel chain’s reputation.
    Scenario 2:
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  356. scenario 1: The names, email address and phone numbers of over three million hotel guests. scenario 2: Weaknesses in the platform’s security practices.

  357. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  358. DAY 1
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  359. Day 1
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  360. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  361. Scenario 1
    The hackers took the hotel chain’s reputation.
    Scenario 2
    The hackers exploited the weaknesses in the platform’s security practices.

  362. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  363. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

    Scenario 2-Weaknesses in the platform’s security practices.

    1. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

      Scenario 2-Weaknesses in the platform’s security practices

  364. The names,  email address and phone numbers of over three million hotel guests.

    Taking advantage of student information not being correctly validated on the platform.

  365. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  366. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  367. Scenario 1
    1.The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    2. Weaknesses in the platform’s security practices.

  368. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  369. Scenerio1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio2
    Weaknesses in the platform’s security practices.

  370. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  371. 1. The names, email address and phone numbers of over three million hotel guests.
    2 Weaknesses in the platform’s security practices.

  372. scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  373. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices.

  374. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  375. Scenario 1 answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer: Weaknesses in the platform’s security practices.

  376. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  377. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  378. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  379. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  380. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  381. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  382. 1. The names, email address and phone numbers of over three million hotel guests.

     2. Weaknesses in the platform’s security practices.

  383. CHRISTOPHER CHINEDU NWIKE

    Scenario 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  384. Scenario 1
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  385. Scenario 1

    The card payment information of over three million guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  386. The names, email address and phone numbers of oveer three million guests.

    Weaknesses in the platform’s security practices.

  387. Cisco’s ISR 4000 provides routing, filtering and encryption in a single platform.
    1. Router

    Cisco’s Firepower 4100 Series shows what’s happening on the network so that you can act faster in the face of a cyber attack
    2. Firewall

    Cisco’s AnyConnect Secure Mobility Client empowers remote workers with highly secure access to @Αpollo’s network from any device, at any time, in any location.
    3. VPN

    Cisco’s AMP provides next-generation endpoint protection, scanning and constantly monitoring files for malicious behavior
    4. Antimalware

  388. The names, email address and phone numbers of over three million hotel guest.

    weakness in the platforms security practices.

  389. Scenero 1. The names, email address and phone numbers of over three million hotel guests.

    Scenero 2. Weaknesses in the platform’s security practices.

  390. 1) The names, email address and phone numbers of over three million hotel guests.
    2) Weaknesses in the platform’s security practices.

  391. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Bypassing the platform’s access control methods

  392. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  393. Scenerio 1 Answer: The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2 Answer: Weaknesses in the platform’s security practices.

  394. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  395. scenario 1
    The card payment information of over three million guests.

    scenario 2
    Weaknesses in the platform’s security practices.

  396. First scenario:
    The hotel chain’s reputation

    Second scenario:
    Weaknesses in the platform’s security practices.

  397. For the first scenario, the hackers took The names, email address and phone numbers of over three million hotel guests.

  398. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    • White hat
    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    • Black hat
    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Please select an option
    • Gray hat
    • Black hat
    • White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    • Black hat
    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    • White hat

  399. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  400. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  401. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  402. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  403. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  404. 1. Gray hat
    2. Black hat
    3. White hat
    4. black hat
    5. White hat
    Scenario I
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  405. SCENERIO 1
    The hotels reputation
    the card payment information of over 3 million guests

    SCENERIO 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Taking advantage of student information not being correctly validated on the platform.

  406. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  407. The hotel chain’s reputation.The hotel chain’s reputation.

    Weaknesses in the platform’s security practices.

  408. Scenrio 1

    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2

    Weaknesses in the platform’s security practices.

  409. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  410. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  411. 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  412. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  413. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  414. Scenario 1:The names,email and phone numbers of over three million hotel guests
    Scenario 2: weakness in the platform’s security services

  415. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  416. Scenario I
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  417. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  418. The card payment information of over three million guests.
    Taking advantage of student information not being correctly validated on the platform.

  419. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    *Gray hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    *Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    *White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    *Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    *White hat

  420. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    Gray hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    White hat

  421. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  422. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  423. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Answer: White

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Answer: Black

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    Answer: White

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Answer: Black

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    Answer: White

  424. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  425. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  426. scenario1.The names, email address and phone numbers of over three million hotel guests..
    secnario2.Weaknesses in the platform’s security practices.

  427. SCENERIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENRIO 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  428. SCENARIO 1
    The card payment information of over three million guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  429. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  430. SCENARIO 1
    Taking advantage of student information not being correctly validated on the platform.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  431. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  432. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  433. Scenerio 1. The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2. Weaknesses in the platform’s security practices.

  434. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices

  435. Scenario 1”
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  436. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weakness in the platform’s security practices.

  437. Answer 1
    The names, email address and phone numbers of over three million hotel guests.
    Answer 2
    Weaknesses in the platform’s security practices.

  438. Scenario 1
    The names , email address and phone numbers of over three million hotel guests .

    Scenario 2
    Weakness in the platform’s security practices

  439. Scenario 1..
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2….
    Weaknesses in the platform’s security practices.

  440. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  441. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  442. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  443. Scenerio 1:The names, email address and phone numbers of over three million hotel guests

    Scenerio 2: Weakness in the platform’s security practices

  444. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  445. Scenario 1:The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  446. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  447. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  448. No 1.The names, email address and phone numbers of over three million hotel guests.

    No 2.Weaknesses in the platform’s security practices.

  449. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  450. Scenario 1: The names, email address and phone numbers of over three million hotel guests. But ultimately, the reputation of the hotel chain has been compromised because both affected and none affected customers will find it difficult trusting them to keep their personal informations safe.
    Scenario 2: Weaknesses in the platform’s security practices.

  451. First Scenario: The card payment information of over three million guests.

    Second Scenario: Weaknesses in the platform’s security practices.

  452. 1st Scenario-The names, email address and phone numbers of over three million hotel guests.

    2nd Scenario-Weaknesses in the platform’s security practices.

  453. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  454. 1st Scenario – The hotel chain’s reputation

    2nd Scenario – Weaknesses in the platform’s security practices.

  455. Scenario 1: The hotel chain’s reputation

    Scenario 2: Bypassing the platform’s access control methods.

  456. 1. White Hat
    2. Black Hat
    3. White Hat
    4. Gray Hat
    5. White hate

    Internal
    invite malware onto the organization’s network by clicking on malicious emails or websites

    External
    use social engineering to gain unauthorized access to organizational data.

  457. For scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  458. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Bypassing the platform’s access control methods.

  459. SCENARIO 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    SCENARIO 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  460. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chains reputation
    Scenario 2
    Weaknesses in the platform’s security practices.

  461. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  462. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  463. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  464. First Scenario

    The names, email address and phone numbers of over three million hotel guests.

    Second Scenario

    Weaknesses in the platform’s security practices.

  465. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  466. Scenario1:
    The hotel chain’s reputation.so the hackers have access to there personal information.

    Scenario2:
    The username and password of all of the hotel’s employee.

  467. Scenrio 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenrio 2:
    Weaknesses in the platform’s security practices.

  468. Scenario1.
    The hotel chain’s reputation.so the hackers have access to there personal information.
    Scenario2.
    The username and password of all of the hotel’s employee.

  469. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  470. Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  471. For senecio 1
    The card payment information of over three million guests.
    For secenrio 2
    Taking advantage of student information not being correctly validated on the platform.

  472. for scenerio 1
    The card payment information of over three million guests

    for scenerio two
    Weaknesses in the platform’s security practices.

  473. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  474. The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests.

  475. for scenerio 1
    The card payment information of over three million guests

    for scenerio two
    Weaknesses in the platform’s security practices.

  476. For scenario 1,
    The names, email address and phone numbers of over three million hotel guests

    For scenario 2,
    Weaknesses in the platform’s security practices.

  477. Answer to scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Answer to scenario 2
    Weaknesses in the platform’s security practices.

  478. 1.The card payment information of over three million guests.
    2.The names, email address and phone numbers of over three million hotel guests.

  479. 1.The names, email address and phone numbers of over three million hotel guests

    Scenerio 2
    Taking advantage of student information not being correctly validated on the platform.
    Related

  480. Scenario 1 – The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2 – Weaknesses in the platform’s security practices.

  481. Scenario 1 – The names, email address and phone numbers of over three million hotel guests

    Scenario 2 – Weaknesses in the platform’s security practices.

  482. Symptoms of Malware:-

    modified or deleted files
    the presence of unknown files, programs or desktop icons
    unknown processes running
    programs turning off or reconfiguring themselves

  483. The names, email address and phone numbers of over three million hotel guests.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  484. You’ve logged into your laptop but it contains some photos belonging to the previous user, who no longer works at DEXA Your line manager asks you to delete them. You drag the photos into the recycle bin, open the recycle bin, select them and click ‘Delete’ once again. That should do it!

    Do you think the photos are really gone from the laptop?

    Select the correct answer, then Submit.

    ❌ Yes, the photos can no longer be retrieved.
    ✅ No, the photos are just inaccessible from the operating system.
    Think about it? What’s your answer?
    My answer is option B. No, the photos are just inaccessible from the operating system.

  485. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  486. 1. White Hat
    2. Black Hat
    3. Gray Hat
    4. Black Hat
    5. Gray Hat

    Internal
    invite malware onto the organization’s network by clicking on malicious emails or websites

    External
    use social engineering to gain unauthorized access to organizational data.

  487. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2
    Weaknesses in the platform’s security practices.