Chapter 1-2
Chapter 3
Chapter 4
Chapter 5
All Chapters
100

What type of computer flaw does the book open by focusing on?

A zero-day vulnerability

100

What famous cyberweapon is discussed as a turning point in cyberwarfare?

Stuxnet

100

What kind of people discover and sell zero-day vulnerabilities?

Hackers or security researchers

100

What agency is frequently connected to stockpiling cyber vulnerabilities?

The NSA

100

What is the central topic of these chapters?

Cyber warfare and zero-day vulnerabilities

200

What does the term "zero-day" mean?

A vulnerability unknown to the software maker and not yet patched

200

What country’s nuclear program was Stuxnet designed to sabotage?

Iran

200

Who are the biggest buyers of zero-day exploits?

Governments and intelligence agencies

200

What happens when leaked exploits escape into the public?

They can be used by criminals or hostile nations

200

Daily Double

What invisible threat connects all five chapters?

Undisclosed software vulnerabilities

300

Which industry revolves around buying and selling zero-day exploits?

The vulnerability or exploit market

300

What made Stuxnet different from earlier cyberattacks?

It caused physical damage using software

300

Why are zero-day exploits so valuable?

They allow undetected access to systems

300

What does the book suggest happens when governments hoard exploits?

Everyone becomes less safe

300

What role do governments play throughout the book?

They buy, use, and hide cyber weapons

400

What is the main danger of keeping zero-day vulnerabilities secret?

They can be used to secretly attack systems and infrastructure

400

Who is believed to have created Stuxnet?

The United States and Israel

400

What ethical dilemma is raised about selling exploits?

Selling them can put innocent people at risk

400

What real-world consequence can result from leaked cyber weapons?

Global cyberattacks and infrastructure damage

400

What is the main warning the author gives readers?

Cyber weapons can spiral out of control

500

What global risk is introduced in the opening chapters as being tied to cyber weapons?

The potential collapse of global security or critical infrastructure

500

Why did Stuxnet change how nations viewed cyber weapons?

It proved cyberattacks could cause real-world destruction

500

What is the main conflict between security and secrecy in this chapter?

Whether vulnerabilities should be disclosed or weaponized

500

What question does the chapter force readers to ask about government power?

Who is being protected — citizens or national interests?

500

According to the book, why could cyber warfare “end the world” as we know it?

Because it threatens global systems without clear rules or limits