Understanding Information Warfare and Democracy

Understanding Information Warfare and Democracy

Assessment

Interactive Video

Created by

Mia Campbell

Social Studies, Journalism, History, Computers

10th Grade - University

Hard

The video discusses the vulnerabilities of Western democracies to information operations, highlighting the 2016 hacking incidents and the role of Russian hackers like APT28. It explores how modern information operations exploit open societies, using tactics like media manipulation and reflexive control to influence public perception. The video emphasizes the need for critical thinking as a defense against such operations in the digital age.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one way to undermine Western democracy according to the video?

Support town halls

Promote free elections

Encourage open debates

Make people question the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which group was responsible for the 2016 hacking incidents discussed in the video?

Lizard Squad

Anonymous

Fancy Bear

APT28

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role did the media play in the 2016 hacking incidents?

They protected the information

They exposed the hackers

They amplified the sensational narratives

They ignored the leaks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a major reason the US and the West were unprepared for the 2016 information operations?

Focus on traditional espionage

Overconfidence in technology

Lack of cybersecurity measures

Inability to recognize modern information operations

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did Russia exploit open societies according to the video?

Through economic sanctions

By encouraging transparency

Through social media manipulation

By promoting free speech

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'reflexive control' as described in the video?

A method to control physical reflexes

A strategy to influence decisions through information

A technique to enhance cybersecurity

A way to manage public relations

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a consequence of the leaked phone call in 2014?

A unified response to Russia

Diplomatic backlash and a weakened response to Russia

Increased support for Ukraine

Strengthened US-EU relations

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did the Russian government recognize about technology before the first iPhone was released?

Its role in enhancing communication

Its ability to improve education

Its risks and opportunities for information manipulation

Its potential for economic growth

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the strongest defense against information manipulation?

Two-factor authentication

Advanced encryption

Critical thinking

Firewalls

10.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is information in the digital age considered seductive and easy to pass on?

Due to its complexity

Because it is heavily encrypted

Due to its authenticity

Because it is always accurate

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?