5 Devastating Security Flaws You've Never Heard Of
Interactive Video
•
Science, Information Technology (IT), Architecture
•
11th Grade - University
•
Hard
Wayground Content
Used 1+ times
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is often the most vulnerable component in a security system?
The user
The hardware
The network
The software
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of vulnerability was Stage Fright?
Privilege escalation
Remote code execution
Denial of service
Phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did Stage Fright exploit Android devices?
Through a phishing email
By exploiting a buffer overflow
Via a fake app installation
Through a network attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the primary method of attack used by Eternal Blue?
Man-in-the-middle
Cross-site scripting
SQL injection
Remote code execution
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the main consequence of the WannaCry attack?
Network congestion
Hard drive encryption
System slowdown
Data theft
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the Shell Shock vulnerability primarily affecting?
Mobile devices
Internet infrastructure
Personal computers
Wireless networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the root cause of the Shell Shock vulnerability?
Hardware failure
Protocol design flaw
Programmer error
User negligence
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Command Injection
Interactive video
•
University
6 questions
Online stores compromised by hackers stealing credit card data
Interactive video
•
11th Grade - University
11 questions
Cybersecurity Insights from Academic Research
Interactive video
•
10th Grade - University
8 questions
Fundamentals of Secure Software - SCA (Software Composition Analysis)
Interactive video
•
University
8 questions
How the Krack Hack Breaks Wi-Fi Security
Interactive video
•
11th Grade - University
6 questions
D-Link Vulnerabilities and Planned Obsolescence
Interactive video
•
11th Grade - University
6 questions
How Did the Liblzma Hack Happen?
Interactive video
•
11th Grade - University
8 questions
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server
Interactive video
•
University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Science
16 questions
Metric Conversions
Quiz
•
11th Grade
13 questions
Amoeba Sisters: Biomolecules
Interactive video
•
9th - 12th Grade
50 questions
Weathering, Erosion, and Deposition Review
Quiz
•
11th Grade
45 questions
Interim Review
Quiz
•
9th - 12th Grade
66 questions
Earth Sci Unit 2 Ch. 4-5 Test Review
Quiz
•
9th - 12th Grade
58 questions
Biomolecule Test Corrections
Quiz
•
9th - 12th Grade
36 questions
Unit 2
Quiz
•
12th Grade
20 questions
Trophic Levels and Food Webs
Quiz
•
10th - 12th Grade