Uber Probes Hacker Data Breach

Interactive Video
•
Business
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did the attackers initially gain access to Uber's network?
Through a phishing email
By exploiting a software vulnerability
Via a spam campaign targeting privileged users
By physically accessing Uber's offices
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What unusual activity did the attackers cause on Uber's internal networks?
They sent phishing emails to all employees
They shut down Uber's ride-sharing service
They posted inappropriate pictures
They deleted important files
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was Uber's immediate response to the breach?
They shut down all operations
They publicly disclosed all details of the breach
They fired the security team
They instructed employees to stop using Slack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What system did the attackers access that is related to Uber's bug bounty program?
The company's financial records
Uber's customer database
The HackerOne platform
Uber's internal email system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did the security community become aware of the breach?
Through a public announcement by Uber
Through a leaked internal memo
By receiving spam messages from the attackers
Via a news report
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was Joe Sullivan on trial for?
Leaking confidential information
A data breach from 2016 that was not properly disclosed
Mismanagement of Uber's security team
A recent data breach at Uber
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What broader issues in the tech industry are highlighted in the final section?
Increased activism and security challenges
The rise of AI technology
The decline of traditional media
The growth of remote work
Similar Resources on Wayground
6 questions
Bash Computer Flaw: Is Your System Safe?

Interactive video
•
University
6 questions
Uber's Khosrowshahi Faces Setback With Hacking Mess

Interactive video
•
University
6 questions
Bash Computer Flaw: Is Your System Safe?

Interactive video
•
University
6 questions
Apple tighten up App store after China Hack

Interactive video
•
University
6 questions
Malware Used for Surveillance in 10 Countries: Symantec

Interactive video
•
University
3 questions
Cybersecurity Tips for the Holiday Shopping Season

Interactive video
•
University
8 questions
Teen Cyber Prodigy Hijacks Teslas

Interactive video
•
University
6 questions
Hackers Trick Generative AI to Expose Flaws and Biases

Interactive video
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Business
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University