Open-Source Security and Global Commons

Open-Source Security and Global Commons

Assessment

Interactive Video

Social Studies, History, Education, Business

10th Grade - University

Hard

Created by

Liam Anderson

FREE Resource

The video discusses the evolution of security from the 20th to the 21st century, emphasizing the need for open-source security. It highlights the inadequacy of traditional security measures like walls and the importance of building bridges through international, interagency, and private-public collaboration. The speaker addresses global threats such as piracy, cybercrime, trafficking, and terrorism, advocating for strategic communication and cooperation. Examples include literacy programs in Afghanistan and disaster relief efforts. The video concludes by stressing the role of competent militaries and the power of collective intelligence in creating security.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the speaker's main argument against building walls for security?

Walls do not effectively prevent threats.

Walls are too expensive to maintain.

Walls are outdated technology.

Walls create more enemies.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT mentioned as a threat to the global commons?

Piracy

Cybercrime

Human trafficking

Climate change

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the speaker suggest addressing the issue of illiteracy among Afghan soldiers?

By providing online courses

Through military-only training

Through NATO-led literacy programs

By hiring private tutors

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the US Navy hospital ship 'Comfort'?

To serve as a training vessel

To transport troops

To provide humanitarian aid

To conduct military operations

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of the video, what role do social networks play in security?

They replace traditional military forces.

They are used to monitor threats.

They help spread strategic communication.

They are a source of cyber threats.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the reaction to the speaker's comment about needing friends on Facebook?

It led to a surge of friend requests.

It was criticized by the media.

It resulted in a security breach.

It was ignored by the audience.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the speaker use as a metaphor for the collaborative approach to security?

A military operation

A diplomatic meeting

A social media post

A Wikipedia article

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?