Here's What We Know About Russian Hackers

Here's What We Know About Russian Hackers

Assessment

Interactive Video

Business, Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the activities of the cyber group Fancy Bear, also known as APT28, which is linked to the Russian government. It covers their targets, including journalists, defense attaches, and political organizations, and their methods, such as malware and leaks. The ongoing threat of their operations in the US and Europe is highlighted, along with forensic evidence linking them to Russia. The video also explores the concept of cyber sovereignty and the challenges of state-sponsored cyber espionage.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary method used by APT28 to infiltrate networks?

Social engineering

Malware

Denial of service attacks

Phishing attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization was targeted by APT28 before the 2016 Olympics?

World Anti-Doping Agency

World Health Organization

United Nations

International Olympic Committee

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does APT28 primarily influence public discourse?

By hacking social media accounts

By creating fake news websites

By organizing public protests

By leaking information to media outlets

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key forensic indicator linking APT28 to the Russian government?

Compile times matching Moscow's time zone

Use of Russian language in code

IP addresses traced to Russian servers

Emails written in Russian

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of targets does APT28 focus on?

Healthcare organizations

Financial institutions

Educational institutions

Government and defense entities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main question regarding cyber sovereignty discussed in the transcript?

How to prevent cyber attacks

The definition of sovereignty in cyberspace

The role of international law in cyberspace

The legality of cyber espionage

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the stance of the US government on the inevitability of cyber attacks?

They believe attacks can be completely prevented

They see it as a matter of when, not if

They believe attacks are unlikely

They think only certain sectors are at risk