Did China Help North Koreas Hack Attack on Sony?
Interactive Video
•
Business, Social Studies, Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the significance of Chinese IP addresses in the context of cyberattacks?
They confirm the attacks were routed through Russia.
They imply that China had knowledge of the attacks.
They indicate the attacks originated from North Korea.
They suggest that China was unaware of the attacks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where are most North Korean cyber facilities located?
Germany
United Arab Emirates
People's Republic of China
United States
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
From which countries are North Korean cyber warriors trained?
China and Russia
South Korea and Japan
United States and Iran
Germany and UAE
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might President Obama have referred to cyberattacks as 'cyber vandalism' instead of 'cyber terrorism'?
To suggest the attacks were harmless
To avoid implicating China directly
To emphasize the need for a military response
To downplay the severity of the attacks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What complicates the US's diplomatic efforts with China regarding cybersecurity?
China's denial of any cyber activities
The US's lack of evidence against China
China's own cyberattacks on US businesses
The US's refusal to engage in talks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the estimated annual loss for American companies due to technology theft, according to the Blair Huntsman report?
$200 billion
$50 billion
$100 billion
$475 billion
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main challenge in addressing cyberattacks from North Korea and China?
Lack of technological capability
Ineffective response strategies
Insufficient international support
Over-reliance on military solutions
Similar Resources on Wayground
6 questions
North Korea Internet Restored After Outage
Interactive video
•
University
2 questions
TED-Ed: Defining cyberwarfare in hopes of preventing it - Daniel Garrie
Interactive video
•
KG - University
6 questions
Trump Says He’ll Be Tough on Breaches After Tax Leak
Interactive video
•
University
6 questions
Pompeo Says Russia Behind SolarWinds Hack
Interactive video
•
University
6 questions
Crowdstrike CEO: Microsoft's Software Causes Cyber Security Issues
Interactive video
•
University
6 questions
Jeremy Corbyn: Labour Party targeted by 'serious cyber attack'
Interactive video
•
University
6 questions
Queen & Philip Open National Cyber Security Centre
Interactive video
•
University
8 questions
How the Athenian Project Is Fighting Election Hacking
Interactive video
•
University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Business
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms
Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms
Quiz
•
11th Grade - University
20 questions
La Hora
Quiz
•
9th Grade - University
7 questions
Cell Transport
Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University