Home Computer Security 101
Computer Security 101 Final Exam Answers
Question 1'Phishing' is:
'Phishing' is the term for e-mails sent by spammers who are trying to trick readers into clicking on links and/or giving them personal information. These e-mails often look and sound like they are coming from official agencies. On safecomputing.umich.edu, under 'Latest Alerts', you can view the latest phishing attempts. This is an excellent tool to use to compare against fishy e-mails you receive.
Question 2After receiving the following e-mail, what should I do?
From: UMICH Email Support Team <firstname.lastname@example.org>
To: undisclosed-recipients: ;
Subject: Comfirm Your UMICH.EDU Email Account Immediately!!!
This mail is to inform all our UMICH.EDU users that we will be upgrading our site in a couple of days from now. So you as a Subscriber of our site you are required to send us your Email account details so as to enable us know if you are still making use of your mail box. Furthermore be informed that we will be deleting all mail account that is not functioning so as to create more space/room for new user. so you are to send us your original mail account details which are as follows:
Failure to do this will immediately render your email address/account deactivated from our database.
Thank you for using UMICH.EDU Email Account!
Yours In Service.
The UMICH.EDU Email Support Team Webmail Admin Service.
The e-mail is fraudulent. Never, ever send your password, username or other private, personal information via e-mail.
Question 3Should I trust this link to take me to the U-M web site?
You can check the destination of a hyperlink by positioning your mouse over the link and checking the status bar at the bottom of the page. This is an important habit to get into. By doing so, you can save yourself and your computer from being directed to a malicious or fraudulent webpage.
Question 4College students are at risk for identity theft because:
Even if you don't have much money to steal, someone just a few years out of high school has an identity that can be stolen and used to obtain new lines of credit. Be careful about what you post on social networking sites: don't post a lot of specific information (high school attended & year of graduation; complete birth date; home address). Another good habit to practice is shredding credit card offers with your name pre-printed on the application.
Question 5Which of the following is NOT a good practice when choosing a password:
A strong password is long, complex, and unique.
Question 6It takes just under 2 minutes to crack a five-character password with lower case letters only (abc). How long would it take to crack versus a 10-letter password using both upper and lower case letters (AaBbCc)?*
*The table below is calculated by assuming 100,000 encryption operations per second. Figures are taken from the University of Wyoming Information Technology, http://uwadmnweb.uwyo.edu/InfoTech/security/passwords.htm.
This goes to show how effective a long string of complex characters can be when creating a password. It’s also really important to create new password for every account you have.
Question 7Which of the following activities could I probably do safely without fear of a virus infection?
Activities A, B and C all put you at risk of acquiring a virus. It is important to use good judgment when downloading from the Internet. In other words, do not download from untrustworthy sources. Additionally, it is important to make sure you keep all security patches up-to-date (patches are small packages of software designed to update or fix problems with a computer program or its supporting data) and to use a firewall.
Question 8Where can I get help if I think my computer has a virus?
All of these resources are available to University of Michigan students.
Question 9How should I protect my laptop and data while traveling?
The number one and best way to keep your laptop, and the information on it, safe while travelling is to keep it on you at all times. To protect your data inside your computer in case it is lost or stolen, use the built-in encryption feature in your Mac or PC. For more information on encryption, visit http://safecomputing.umich.edu/tools/security_shorts.html.
Question 10Using peer-to-peer file-sharing software could put my computer's security at risk because:
Even if you think you are taking measures to do the right thing, you might still be at risk. For example, scam artists will, for a fee, provide access to a library of music, while using your computer as a file-sharing server to unlawfully share music with others. Also, even if you’ve set your file-sharing software to download only, some programs automatically reset themselves every time you reboot. To be safe, get rid of your P2P software and only get your media from fully licensed web sites like iTunes or Real Rhapsody, or directly from the artist's web page. Visit safecomputing.umich.edu/copyright to learn more about what UM is doing to educate students on P2P file sharing.
An easy and free way to protect my laptop from online threats is to:
Make sure you have the big four security tools in place:
Easy directions for putting all these measures into place can be found at: http://www.safecomputing.umich.edu/tools/download/securityshorts_essentials_homepc.pdf
Would you be interested in participating in a focus group on IT Security issues? (The answer to this question will not improve your chances of winning a prize in this quiz!)
January 17, 2013