Skip to main content Skip to navigation
Information Technology Services

Hacktober Questions & Answers

…and we’re back!

Information Technology Services is excited to present this year’s Hacktober Trivia! Last year was so much fun and we want to say a very big thank you for getting on board with spreading cyber security awareness the whole month of October.

Our Hacktober trivia game consists of a new question published on our social media (@itswsu – Twitter, Facebook, and Instagram) each business day. Respond each day to be considered for our weekly WSU swag. All responses will also form the pool for our two grand prizes (one student prize and one staff prize) to be awarded on October 31st.

Non-WSU email addresses are not considered for prizes, so please use your WSU email address when responding.

Respond to the security question of the day on our social media (@itswsu) to enter your email address into prize drawings.

 

Eligibility
Participation Is voluntary. Emails are only used to identify winners. All WSU students and staff are eligible.
If you win a weekly prize, you’ll still be eligible to win the grand prize to be awarded on October 31st.
You must be following @itswsu on at least one social media platform in order to win.
(WSU’s Central Information Technology Services employees are not eligible to win.)

Hacktober Questions & Answers

Want to be entered to win our weekly prizes? Visit our social media @ITSWSU to answer our daily questions and be entered into weekly drawings! All entries will also be considered for our staff and student grand prize.

 

 Question: Answer:
October 1stTo whom should you forward a potential phishing email received in your WSU email account?A. iwanttheprize@wsu.edu
B. iloveoctober@wsu.edu
C.
abuse@wsu.edu
D. pleasehelpme@wsu.edu
C. abuse@wsu.edu
October 2ndWhat is it called when hackers use infecting software to break into a network of private computers without the owner's knowledge?A. Malware
B. Phishing Module
C. Spyware
D. Botnet
D. Botnet
October 3rdTrue or False - Internet service providers don't have access to my data and online activity if I use a "private browser"A. True
B. False
B. False
October 4thWhat does the "https://" at the beginning of a URL mean, as opposed to "http://" (without the "s")?A. Information entered into the site is encrypted
B. The website is the newer version of an old website
C. The domain name has been properly registered
D. The website content has been approved by ICANN
A. Information entered into the site is encrypted
October 5thWho invented the first computer?A. Bill Gates
B. Lester Allen Pelton
C. Vincent Gray Cerf
D. Charles Babbage
D. Charles Babbage
October 8thDuring what era was the first computer built?A. 1750-1790
B. 1790-1830
C. 1830-1870
D. 1870-1910
C. 1830-1870
October 9thTo whom should you forward a potential phishing email received in your WSU email account?A. iwanttheprize@wsu.edu
B. iloveoctober@wsu.edu
C.
abuse@wsu.edu
D. pleasehelpme@wsu.edu
C. abuse@wsu.edu
October 10thTrue or False - By disabling the GPS function on my smartphone, I am ensuring and preventing my smartphone from being trackedA. True
B. False
B. False
October 11thWhat is the best way to keep hackers from compromising your password? A. Write down passwords in secret code
B. Use long strings of upper and lowercase letters, numbers and symbols
C. Keep passwords in a locked excel file on your laptop
D. Use short strings of a variety of letters followed by numbers
B. Use long strings of upper and lowercase letters, numbers and symbols
October 12thTrue or False - Using a private Wi-Fi network (one that requires a password) prevents other users from viewing the sensitive information sent across that Wi-Fi networkA. True
B. False
B. False
October 15thOf the following passwords, which one is considered the most safe and secure?A. itSWsU!18
B. Information_Tech_Coug
C. 1technology2SERVICES3
D. !!iLoveWSU!!
A. itSWsU!18
October 16thYou get a phone call from someone claiming to be Microsoft support. What should you do if they ask for your login information?A.
Tell them your pizza order
B.
Give them all of your passwords
C.
Tell them your address
D.
Hang up and contact Microsoft directly to ask if they contacted you about the situation
D.
Hang up and contact Microsoft directly to ask if they contacted you about the situation
October 17thTo whom should you forward a potential phishing email received in your WSU email account?A.
iwanttheprize@wsu.edu
B.
iloveoctober@wsu.edu
C.
pleasehelpme@wsu.edu
D.
abuse@wsu.edu
D. abuse@wsu.edu
October 18thWhat should you install on your computer or laptop to help detect and remove malware?A. Keystroke Logging
B. Spyware
C. An Anti-Virus Program
D. A Spoof Program
C. An Anti-Virus Program
October 19thA pop-up link opens when you are clicking around on an unfamiliar website, what should you do?A. Close the new tab containing the pop-up and change your browser setting to disallow pop-ups
B. Click over to the pop-up and browse the content
C. Leave the pop-up open
D. Visit and interact with the pop-up website
A. Close the new tab containing the pop-up and change your browser setting to disallow pop-ups
October 22ndIn what year will the next full moon occur during Halloween?A. 2020
B. 2025
C. 2030
D. 2035
B. 2025
October 23rdWhat cybersecurity risk does using a Virtual Private Network (VPN) minimize?A. Using insecure browsers
B. Visiting insecure websites
C. Clicking insecure links
D. Using insecure Wi-Fi networks
D. Using insecure Wi-Fi networks
October 24thOverloading a website's server with requests that prevent people from accessing their information is an example of what?A. A phishing attack
B. A DDoS attack
C. Ransomware
D. Overfloware
B. A DDoS attack
October 25thTo whom should you forward a potential phishing email received in your WSU email account?A. abuse@wsu.edu
B. iwanttheprize@wsu.edu
C. iloveoctober@wsu.edu
D. pleasehelpme@wsu.edu
A. abuse@wsu.edu
October 26thWhat kind of electric attack is done by people who are highly motivated, technically skilled, and focused on the goals they have to pursue to the attack?A. Unstructured Attack
B. Structured Attack
C. Direct Attack
D. Indirect Attack
B. Structured Attack
October 29thTrue or False - When companies post their privacy policies, this ensures that all the data they collect from their consumers is confidentialA. True
B. False
B. False
October 30thWhat is it called when a specific type of software or spyware (typically encrypted) records every single key stroke made on a Log file?A. Macro Virus
B. Trojan Horse
C. Key Logging
D. Smuf Attack
C. Key Logging
October 31stHow heavy is the world's heaviest pumpkin?A. 978.3 pounds
B. 2,624.6 pounds
C. 3,842.2 pounds
D. 4,056.2 pounds
B. 2,624.6 pounds