CyberSense Quiz - January 28, 2013

How did you do? See below for answers.

  1. Using someone else's password to access the UTHSC network and its programs is all right as long as your supervisor approves it first.

    FALSE - Another person's password may never be used to access the UTHSC network; it is not approved university policy, nor is it allowable under NIST and other IT Security best practices. It leaves a fraudulent audit trail indicating that the password owner has accessed the network.
  2. Telling someone else your password greatly increases the risk of making your account less secure.

    TRUE - Users should never share a password and change passwords often.
  3. Using personal information such as your street address, dog's name, favorite car or other easy-to-find information is risky.

    TRUE - Published profile data is the first source Phishing fraudsters use to break into accounts.
  4. Sending your password information in response to an email request from UTHSC, your bank, or other sources you're very familiar with, is OK.

    FALSE - Responding to an email query regarding data about any personal accounts is only ok if you are willing to lose a lot of time, money and energy repairing the damage of electronic identity theft.
  5. Using a combination of a phrase that is meaningful to you with capital/lower case letters and various symbols is a great form of password protection.

    TRUE - Using first letters of a favorite book, a phrase from a song, and so on, along with a sprinkling of random letters and symbols makes it infinitely more difficult to guess your password.

Contact Us

Department of Information Technology Services

877 Madison Ave
Memphis, Tennessee 38163
Phone: 901-448-2222
Fax: 901-448-8199