Skip to main content Skip to navigation
Information Technology Services

Hacktober Questions & Answers

…and we’re back!

Information Technology Services is excited to present this year’s Hacktober Trivia! Last year was so much fun and we want to say a very big thank you for getting on board with spreading cyber security awareness the whole month of October.

Our Hacktober trivia game consists of a new question published on our social media (@itswsu – Twitter, Facebook, and Instagram) each business day. Respond each day to be considered for our weekly WSU swag. All responses will also form the pool for our two grand prizes (one student prize and one staff prize) to be awarded on October 31st.

Non-WSU email addresses are not considered for prizes, so please use your WSU email address when responding.

Respond to the security question of the day on our social media (@itswsu) to enter your email address into prize drawings.

 

Eligibility
Participation Is voluntary. Emails are only used to identify winners. All WSU students and staff are eligible.
If you win a weekly prize, you’ll still be eligible to win the grand prize to be awarded on October 31st.
You must be following @itswsu on at least one social media platform in order to win.
(WSU’s Central Information Technology Services employees are not eligible to win.)

Hacktober Questions & Answers

Want to be entered to win our weekly prizes? Visit our social media @ITSWSU to answer our daily questions and be entered into weekly drawings! All entries will also be considered for our staff and student grand prize.

 

 Question: Answer:
October 1stTo whom should you forward a potential phishing email received in your WSU email account?A. iwanttheprize@wsu.edu
B. iloveoctober@wsu.edu
C.
abuse@wsu.edu
D. pleasehelpme@wsu.edu
C. abuse@wsu.edu
October 2ndWhat is it called when hackers use infecting software to break into a network of private computers without the owner's knowledge?A. Malware
B. Phishing Module
C. Spyware
D. Botnet
D. Botnet
October 3rdTrue or False - Internet service providers don't have access to my data and online activity if I use a "private browser"A. True
B. False
B. False
October 4thWhat does the "https://" at the beginning of a URL mean, as opposed to "http://" (without the "s")?A. Information entered into the site is encrypted
B. The website is the newer version of an old website
C. The domain name has been properly registered
D. The website content has been approved by ICANN
A. Information entered into the site is encrypted
October 5thWho invented the first computer?A. Bill Gates
B. Lester Allen Pelton
C. Vincent Gray Cerf
D. Charles Babbage
D. Charles Babbage
October 8thDuring what era was the first computer built?A. 1750-1790
B. 1790-1830
C. 1830-1870
D. 1870-1910
C. 1830-1870
October 9thTo whom should you forward a potential phishing email received in your WSU email account?A. iwanttheprize@wsu.edu
B. iloveoctober@wsu.edu
C.
abuse@wsu.edu
D. pleasehelpme@wsu.edu
C. abuse@wsu.edu
October 10thTrue or False - By disabling the GPS function on my smartphone, I am ensuring and preventing my smartphone from being trackedA. True
B. False
B. False
October 11thWhat is the best way to keep hackers from compromising your password? A. Write down passwords in secret code
B. Use long strings of upper and lowercase letters, numbers and symbols
C. Keep passwords in a locked excel file on your laptop
D. Use short strings of a variety of letters followed by numbers
B. Use long strings of upper and lowercase letters, numbers and symbols
October 12thTrue or False - Using a private Wi-Fi network (one that requires a password) prevents other users from viewing the sensitive information sent across that Wi-Fi networkA. True
B. False
B. False
October 15thOf the following passwords, which one is considered the most safe and secure?A. itSWsU!18
B. Information_Tech_Coug
C. 1technology2SERVICES3
D. !!iLoveWSU!!
Check back on October 16th for the answer to this question!