Passwords
Phishing
Mobile Security
Computer Security
Social Media
100
Is it acceptable to use the same password for multiple accounts?
No. Different passwords should be used for each separate account.
100
What is phishing?
Refers to an attacker trying to get you to click on links or give them sensitive information.
100
What are some techniques you can use to keep your phone secure?
Lock the device, use encryption, be cautious of what you do on public WiFi, etc.
100
What is the keyboard shortcut for locking a Windows/Mac computer?
Windows - Windows+L Mac - Control+Shift+Power(Newer models) Mac - Control+Shift+Eject(Older models)
100
Who should you not accept friend requests from? a) Family b) Friends c) Co-workers d) Strangers
d) Strangers
200
How can you make passwords more complex?
Uppercase, lowercase, special characters, numbers, etc.
200
Will the university ever request your StarID password by email?
No. If you receive an email requesting you to send your StarID password or any other password, it is a phishing email.
200
Is every WiFi connection secure?
No. It is easy for attackers to get onto public WiFi and watch your every move. Be cautious about what WiFi you connect to.
200
What are the risks associated with using public WiFi?
Hackers can monitor what you do and steal your data
200
Timmy posts his status and it says "I'll be going to Miami at 3/23/16 and my flight will be leaving at 10 am." What are the problems with this status?
Timmy is letting everyone know when he's not going to be home. So Timmy himself could be victim to an attack.
300
What is the recommended length of a password?
12-14+ characters
300
How do you identify a phishing email?
1) Fear techniques - ex) change your password in the next 24 hours or your account will be deleted (click this link) 2) Being rewarded with "money" for giving out personal information If it sounds too good to be true, IT USUALLY IS!
300
Why can it be harmful to store personal information on your phone such as social security number, medical records, passwords, etc.
If the device is lost or stolen your information can be compromised. For this reason, it is important to lock your phone.
300
How do you keep antivirus software as effective as possible?
Ensure that the software is updated and scanning your computer regularly
300
How can tagging people in social media giveaway potentially sensitive information?
Tagging people in posts can potentially can giveaway information to other people such as full name, phone number, location, and friends, etc..
400
Why should passwords not be simple dictionary words?
Using simple dictionary words like "baseball" as a password can be cracked in a matter of seconds.
400
What information can be stolen by a phishing attack? a) Financial data b) Addresses c) Passwords d) Social Security Information e) All of the above
e) All of the above
400
What tool should you use to find your device if it is lost or stolen?
Android Device Manager or Find My iPhone
400
What is the danger in using a built in browser password manager?
Passwords that you save into a browser password manager can be viewed in plain text by anybody who has access to the computer.
400
What types of information do third-party games on social platforms access?
Name, Friends, Photos, Status updates, etc..
500
Which of the following passwords is the strongest? (a) Football1234 (b) BobsBakery5 (c) buddy1990 (d) I’llBeBack#571
(d) I’llBeBack#571
500
What should you do if you receive a phishing email?
Attach the phishing email to a new email and send it to spam@mnsu.edu. After this, you can safely delete the email from your inbox 1) If you have clicked on any links within the email message make sure to change your passwords 2) Scan your computer for any malware that may have been downloaded without your knowledge 3) Monitor your accounts to ensure they are not being tampered with by any unwanted users
500
Why is it important to download applications from trusted sources only?
Downloading applications from non-reputable sources puts you at risk for obtaining unwanted malware that can take control of your device or steal sensitive information.
500
You walked away from your computer leaving it unlocked, what can happen to your computer/sensitive information while you are away?
1) Computer can be stolen 2) Sensitive information can be stolen 3) Malware can be uploaded to the computer 4) Passwords can be stolen from the computer 5) Many other possibilities
500
Can you list a couple security flaws with Instagram or Facebook or Twitter or Snapchat?
Platforms provide information to other people by default. So you have to go in and manually change those security settings.