
Technology Vulnerabilities and Security Concerns
Interactive Video
•
Computers, Science
•
10th Grade - University
•
Hard

Aiden Montgomery
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What humorous misconception did the speaker's grandmother have about his job?
He was a computer repair technician.
He was a computer programmer.
He was responsible for preventing computer theft.
He was a software developer.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What significant change in implanted medical devices occurred in 2006?
They became smaller in size.
They started to have networking capabilities.
They were made from new materials.
They became more affordable.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did researchers demonstrate the vulnerability of ICDs?
By testing on animals.
By using ground beef and bacon to simulate a human body.
By hacking into a live patient's device.
By using a computer simulation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk of hacking modern cars?
Changing the car's color.
Controlling the car's speedometer readings.
Modifying the car's GPS location.
Altering the car's fuel efficiency.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can hackers potentially control a car remotely?
By using a universal remote control.
By accessing the car's internal network physically.
By exploiting vulnerabilities in the car's software via wireless networks.
By hacking into the car's GPS system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a major vulnerability of P25 radios used by law enforcement?
They have a short battery life.
They are easily damaged.
They are too expensive.
They often operate without encryption.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What did researchers find when they scanned P25 radio frequencies?
Encrypted messages were always secure.
They could listen to unencrypted sensitive conversations.
The radios were not used frequently.
The radios had excellent sound quality.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
8 questions
TED: How (and why) Russia hacked the uS election | Laura Galante
Interactive video
•
11th Grade - University
6 questions
Different ways your cryptocurrency could be lost
Interactive video
•
11th Grade - University
6 questions
CLEAN: 'Hacktivity 2010' tackles computer security in Hungary
Interactive video
•
10th Grade - University
8 questions
Hacking the Brain: The Future of Prosthetics
Interactive video
•
11th Grade - University
6 questions
CLEAN : Israeli security forces demolish a home near Qalandiya camp
Interactive video
•
10th Grade - University
8 questions
Researchers explore how babies learn! NSF Science Now 30
Interactive video
•
11th Grade - University
6 questions
Vulnerabilities found in Google’s Indoor Nest camera: Report
Interactive video
•
11th Grade - University
11 questions
Network Security Concepts and Practices
Interactive video
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade