Javascript is required to load this page.
Page Loaded
Welcome to the InfoSec challenge!
Play to earn an entry in our drawing for $100 in Bear Bucks. Here's a big hint: the answers to these questions are in the newsletter content! We'll select our winner randomly from the entrants with the highest scores.
Good luck!
Please enter your WashU email address. We will use this information to notify winners.
What risky strategy do some people try to use to bypass security and escape their phone’s “walled garden?” (Hint: See this month’s
KISS: Isn’t there an App for that?
)
Encryption
Going incognito
Using a VPN
Jailbreaking
If an adult shares a computer with their child, how many user accounts would offer the best security? (Hint: See this month’s
KISS: Isn’t there an App for that
? and
Security Tips for Working From Home
)
One user account with administrator privileges so it’s easier to monitor account activity.
Two user accounts, both with administrator privileges—one for the adult and one for the child.
Three user accounts—one administrator account, one adult account for normal use, and one child account.
All of the above strategies work well.
Data transferred through 5G, 4G, and 4G LTE cellular connections are typically encrypted. (Hint: See this month’s
10 Security Tips for Spring-Break Travelers
)
True
False
Powered by Qualtrics