News and events Tilburg University

Online security & privacy quiz

Published: 05th October 2021 Last updated: 25th July 2022

How alert are you? We made a quiz about current topics about privacy and security. These questions are only the tip of the iceberg. Soon, all employees will be offered a training about privacy and security to learn more about how to work safely (digitally). Also for students a training will be developed. Keep an eye on intranet and student portal for more information.

What does VPN stand for?

a. Virtual Private Network

b. Virtual Privacy Network

c. Virtual PC Network

Answer

a. Virtual Private Network

Background information

When you work from home you connect to the Internet through your own network connection. As a result, you do not have direct connection and access to the campus network. In addition, the university cannot provide the security normally provided on campus, such as performing automatic updates.

We solve this problem with a VPN connection. A connection is then established between your computer and that of the university's network. Unfortunately, we cannot automatically enable this VPN connection for you. You need to connect to VPN from home - every time you log in

This instruction explains how to install the VPN client. You will then need to reconnect to VPN each time you log in (see steps 7 and 8 of the tutorial).

What is the strongest password out of the options below?

​​​​​a. Hello123

b. F@c3B0ok

c. IWantACatAnd10Dogs?

Answer

c. IWantACatAnd10Dogs?

Tips for making strong passwords

  • Think of a one-liner, song lyrics, or a sentence that you can remember easily and use the first letters of each word to set your password. Also use capital letters and punctuation marks.
  • Use a unique password for every single one of your accounts. Cyber criminals often try to log on to as many different online services as possible using a stolen password. If criminals get hold of one of your passwords, they will not have immediate access to all your accounts if all your passwords are different. Also websites where you have an account can be hacked.
  • Whenever possible, use two-factor authentication: in addition to your password, a second step is required for identification, for example, a text message (SMS) or a code generated by a smartphone app such as Microsoft Authenticator.
What is Bitlocker?

a. On online store to buy bitcoins

b. An encryption tool which automatically encrypts drives

c. A way to lock your computer

Answer

b. An encryption tool which automatically encrypts drives

What is considered to be personal data? (more than one option possible)

a. IP-address

b. Identity card number

c. Business registration number

Answer

a. IP-address

b. Identity card number

More information about handling personal data with care

The annual figures of the University are leaked early. Is this is a data breach?

a. Yes

b. No

Anwer
Is it always necessary to conclude a Processor Agreement between the supplier and the University when we purchase a new software or application?

a. No, only in case the supplier has a bad reputation concerning privacy.

b. No, only when personal data of the University is saved at the servers of the supplier.

c. Yes, in the Processor Agreement you also describe other relevant agreements about costs and duration of the contract.

d. Yes, new software always requires a Processor Agreement.

Answer

b. No, only when personal data of the University is saved at the servers of the supplier.

What if I want to make use of an external party for my classes, research, or business? If Tilburg University, as the legal controller, engages a company for the processing of personal data, a processing agreement is required. This is a legal obligation under the GDPR. On Friday October 15, Privacy Officer at Executive Services Max de Bruin gives a workshop establishing a processing agreement.

What of the blow options is an example of Multi Factor Authentication (MFA)?

a. After entering your password, you also have to enter a code which you receive by SMS.

b. The key to your room before you can log-on to your computer.

c. Entering your first name and last name after logging in to your computer.

Answer

a. After entering your password, you also have to enter a code which you receive by SMS.

Whenever possible, use two-factor authentication: in addition to your password, a second step is required for identification, for example, a text message (SMS) or a code generated by a smartphone app such as Microsoft Authenticator.

What is social engineering?

a. An online and offline place to meet each other.

b. The collective term for online of offline psychological manipulation of people into performing actions or divulging confidential information.

c. The development of tools and applications to meet each other online (like Teams).

d. Together with a team developing new online products.

Answer

b. The collective term for online of offline psychological manipulation of people into performing actions or divulging confidential information.

You have access to a system you should not have access to. What should you do?

a. Delete the data and wait until the owner mentions it.

b. Report it to your manager or the IT-helpdesk.

c. Nothing, maybe you need the information later.

d. Share the information on Twitter.

Answer

b. Report it to your manager or the IT-helpdesk.

Who or what is the weakest link in the entire chain of privacy and security?

a. The internet.

b. The encryption of our equipment.

c. Us humans.

d. Our passwords.

Answer