Copyright

Cyber Threats to US National Security

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which country is NOT considered a major cyber threat to the United States?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which of these was an example of a threat to the American economy?

2. Which of these is NOT a reason that information is valuable?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

This quiz and worksheet will help you test your knowledge of cyber threats to the United States. Questions will focus on specific threats and past attacks.

Quiz & Worksheet Goals

Answer these questions to see what you know about:

  • What countries are and are not considered threats to the US
  • Real-world examples of threats to the US
  • Why information is and is not valuable

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the material, such as what countries are not considered threats to the US
  • Information recall - access the knowledge you've gained regarding who leaked information to WikiLeaks in 2013
  • Knowledge application - use your knowledge to answer questions about how attackers could take out infrastructure

Additional Learning

Get more information about the dangers to US security with the lesson titled Cyber Threats to US National Security. It will cover concepts such as:

  • What government agency was compromised to WikiLeaks
  • Why an attacker might want to take out the GPS system
  • How small-time cyber crime may be funding larger scale threats
Support