
North Korean hackers stole sensitive information from Microsoft users
Interactive Video
•
Science, Information Technology (IT), Architecture
•
11th Grade - University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the primary method used by hackers in the Thallium operation?
Using 50 domains for cyber activities
Developing new encryption algorithms
Creating fake social media profiles
Directly hacking into Microsoft servers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did hackers trick users into providing their credentials?
By sending spear phishing emails pretending to be from Microsoft
By hacking into users' computers directly
By offering free software downloads
By using social media platforms
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware was used in the Thallium operation?
Adware
Remote access Trojans like Kim Jong Rat and Baby Shark
Spyware
Ransomware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which regions were most targeted by the Thallium hackers?
US, Japan, and South Korea
South America and Australia
Europe and Africa
Middle East and India
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the purpose of the misleading domains used by hackers?
To host educational content
To sell products online
To trick users into clicking links that install malware
To improve website traffic
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?