Inside Last Week's Cyber Attack: Is Everything Hackable?

Inside Last Week's Cyber Attack: Is Everything Hackable?

Assessment

Interactive Video

Business, Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses a significant DDoS attack that occurred using non-traditional devices like IP cameras and DVRs, highlighting the vulnerabilities in embedded devices. It emphasizes the challenges in defending against such attacks due to the lack of security solutions for these devices. The discussion also covers the future of Internet security, the role of companies like Rebalance Security, and the need for comprehensive solutions to protect billions of devices globally.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was unique about the DDoS attack discussed in the video?

It targeted only government websites.

It was the first DDoS attack ever recorded.

It used traditional computers like laptops and desktops.

It originated from non-traditional devices like IP cameras and DVRs.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major challenge in defending against DDoS attacks from embedded devices?

Too few embedded devices to worry about.

Lack of antivirus software for embedded devices.

Embedded devices are too expensive to protect.

Embedded devices are not connected to the internet.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many embedded devices are projected to exist by 2020?

100 billion

5 billion

22 billion

50 billion

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of Rebalance Security as mentioned in the video?

To create new types of DDoS attacks.

To replace all existing security companies.

To provide security solutions for a wide range of embedded devices.

To manufacture new embedded devices.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might relying on large companies like Cisco not be the best solution for IoT security?

They are not interested in IoT security.

They only focus on their own devices.

They do not have any security expertise.

They are too small to handle the problem.