CyberSense Quiz - January 28, 2013
How did you do? See below for answers.
- Using someone else's password to access the UTHSC network and its programs is all right as long as your supervisor approves it first.
FALSE - Another person's password may never be used to access the UTHSC network; it is not approved university policy, nor is it allowable under NIST and other IT Security best practices. It leaves a fraudulent audit trail indicating that the password owner has accessed the network.
- Telling someone else your password greatly increases the risk of making your account less secure.
TRUE - Users should never share a password and change passwords often.
- Using personal information such as your street address, dog's name, favorite car or other easy-to-find information is risky.
TRUE - Published profile data is the first source Phishing fraudsters use to break into accounts.
- Sending your password information in response to an email request from UTHSC, your bank, or other sources you're very familiar with, is OK.
FALSE - Responding to an email query regarding data about any personal accounts is only ok if you are willing to lose a lot of time, money and energy repairing the damage of electronic identity theft.
- Using a combination of a phrase that is meaningful to you with capital/lower case letters and various symbols is a great form of password protection.
TRUE - Using first letters of a favorite book, a phrase from a song, and so on, along with a sprinkling of random letters and symbols makes it infinitely more difficult to guess your password.
Department of Information Technology Services
877 Madison Ave
Memphis, Tennessee 38163