5 Devastating Security Flaws You've Never Heard Of

Interactive Video
•
Science, Information Technology (IT), Architecture
•
11th Grade - University
•
Hard
Wayground Content
Used 1+ times
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is often the most vulnerable component in a security system?
The user
The hardware
The network
The software
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of vulnerability was Stage Fright?
Privilege escalation
Remote code execution
Denial of service
Phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did Stage Fright exploit Android devices?
Through a phishing email
By exploiting a buffer overflow
Via a fake app installation
Through a network attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the primary method of attack used by Eternal Blue?
Man-in-the-middle
Cross-site scripting
SQL injection
Remote code execution
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the main consequence of the WannaCry attack?
Network congestion
Hard drive encryption
System slowdown
Data theft
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the Shell Shock vulnerability primarily affecting?
Mobile devices
Internet infrastructure
Personal computers
Wireless networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the root cause of the Shell Shock vulnerability?
Hardware failure
Protocol design flaw
Programmer error
User negligence
Create a free account and access millions of resources
Similar Resources on Wayground
6 questions
The Virtually-Unkillable Virus That Makes Itself a Nucleus

Interactive video
•
11th Grade - University
6 questions
How a Simple Mistake Left Arc Browser Open to Hackers

Interactive video
•
11th Grade - University
6 questions
Secure coding control

Interactive video
•
University
6 questions
Use-After-Free Vulnerabilities in Firefox and Tor

Interactive video
•
11th Grade - University
8 questions
How Worried Should You Be About Smart Home Security?

Interactive video
•
11th Grade - University
8 questions
Practical Cyber Hacking Skills for Beginners - CWE and CVE

Interactive video
•
University
6 questions
Taiwan’s outlying maritime outposts at risk of surprise attacks by China: report

Interactive video
•
11th Grade - University
6 questions
A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization

Interactive video
•
University
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Science
16 questions
Metric Conversions

Quiz
•
11th Grade
12 questions
Lab Safety

Quiz
•
6th - 12th Grade
13 questions
Amoeba Sisters: Biomolecules

Interactive video
•
9th - 12th Grade
20 questions
Reading Graphs in Science

Quiz
•
9th - 12th Grade
35 questions
Flinn Lab Safety

Quiz
•
11th Grade
20 questions
Quiz #1: Lab Safety and Scientific Method

Quiz
•
9th - 12th Grade
15 questions
Scientific Method Review

Quiz
•
11th Grade
8 questions
iPad Basecamp 2025-2026

Lesson
•
9th - 12th Grade