1.
True or False, P2P (peer-to-peer) downloading of textbooks is legal.
Correct Answer
B. False
Explanation
Downloading ANY copyrighted material without paying is against the law.
2.
Which of the following is NOT a peer-to-peer (P2P) application?
Correct Answer
C. ITunes
Explanation
Services such as iTunes are legal for downloading music because purchases are made through legal transactions, not from another peer's computer.
3.
Why is Illinois State University blocking P2P traffic in residence halls, wireless ("isunet," "isu-guest," and "isu-public"), and on iSpot Ethernet ports?
Correct Answer
B. To protect Illinois State's students and to maintain the integrity of the institution
Explanation
Students who download illegally face the possibility of being charged thousands of dollars or taken to court.
Trade organizations, like the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), have the right to track and and punish offenders.
4.
True or False, there are ways to use FREE media services and downloading legally.
Correct Answer
A. True
Explanation
Services such as Hulu.com, YouTube, and Imeem.com all legally offer FREE access to media.
5.
What is Phishing?
Correct Answer
B. A scam designed to look legit, but steals your sensitive information
Explanation
Phishing emails that target Illinois State ask you to send:
Your ULID or Your password
Illinois State University will NEVER ask you to send your password in email. If you receive an email that asks you to send your password, you should delete it immediately.
6.
Which of the following is an official Illinois State E-mail address extension
Explanation
Official Illinois State emails are always sent From: (and, if visible, have Reply-To: and Sender:) email addresses that end with @ilstu.edu or @illinoisstate.edu.
7.
You have received an email from "ISU Credit Union".The link to the "Enter Information" page is: http://www.derekspreparty.com/ISU.aspIs it legit?
Correct Answer
B. No
Explanation
Always look at the URL of the page you are at. If the web address doesn't look familiar (even if the web page does look familiar), you should pause to consider why.
8.
Which of the following are effects of computer viruses?
Correct Answer
D. All of the above
Explanation
A computer virus is a self-replicating computer program written to alter the way a computer operates without the permission or knowledge of the user.
9.
What virus protection software is required at Illinois State University?
Correct Answer
B. McAfee VirusScan
Explanation
McAfee VirusScan is the free university-approved anti-virus software.
Anti-virus software proactively protects your computer by scanning each file you attempt to download, open, or run. If the anti-virus software detects a virus in a file you are trying to use, it blocks the action
10.
True or False,spyware secretly gathers user information through the user's Internet connection, usually for advertising purposes
Correct Answer
A. True
Explanation
Spyware monitors your Internet connection—it can track the websites you visit and other things you do online. As it gathers information about you, it sends the data back to its creators.
11.
Which of the following is a way that spyware can be installed on your machine?
Correct Answer
E. All of the above are possiblilities
Explanation
Spyware can be installed on your machine in multiple ways. One way is through "piggybacking," where the spyware is bundled with legitimate software and installed without the user's knowledge. Another way is through infected webpages, where the spyware is automatically downloaded when the user visits a compromised website. Spyware can also be installed through security disguises, where the spyware is disguised as a legitimate security software or update. Lastly, spyware can be installed through viruses, where the malicious code is designed to install spyware on the infected machine. Therefore, all of the options mentioned - piggyback, webpage, security disguise, and virus - are possible ways for spyware to be installed on your machine.
12.
True or False,Illinois State University's computer networks are protected by a firewall
Correct Answer
A. True
Explanation
The campus firewall prevents your computer from being attacked (or even seen) by computers outside the campus network, unless you initiate an outbound connection first.
13.
What does the "s" in https:// stand for?
Correct Answer
C. The "s" in https:// means the website is secure (i.e. encrypted)
Explanation
Before sending your personal information through a campus website, look at the web address to make sure it uses https:// (instead of just http://)
14.
How does Illinois State treat your Social Security number?
Correct Answer
C. Illinois State treats Social Security numbers as confidential, which means access is limited.
Explanation
As outlined in the Campus Conduct Policy, Illinois State uses your Social Security number to accurately process and maintain educational and employment records. It is also used for mandatory tax reporting purposes.
Any record that contains your Social Security number is treated as confidential. Access to such records is limited and secure