Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
What is malware
This mythical beings defy death by sucking the blood of humans
What are vampires
Is it acceptable to use the same password for multiple accounts?
NO!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Superstition says bad luck is imminent if you cross paths with this color cat
What is black
The fraudulent practice of sending emails purporting to be from reputable companies in order to include individuals to reveal personal information, such as passwords and credit card numbers.
What is Phishing
A computer program containing malicious segment that attaches itself to an application program or other executable component
What is a virus
This is considered the birthplace of Halloween
What is Ireland
How can you make passwords more complex?
Uppercase, lowercase, special characters, numbers, etc.
The word witch comes from the Old English word wicce, meaning
What is wise woman
Phishing over the phone.
What is Vhishing\Social Engineering
Malicious software collecting information about users without their knowledge/consent
What is spyware
Michael Meyers mask was actually this actor's mask from Star Trek
Who is William Shatner
What is the recommended length of a password?
12 to 14 Characters
This monster was created as a science experiment
What is Frankenstein
Phishing works because of this.
What is social engineering?
Malicious software that initially presents itself as legitimate program or file
What is a Trojan
This famous magician died on Halloween night in 1926
Who is Harry Houdini
Why should passwords not be simple dictionary words?
Using simple dictionary words like "baseball" as a password can be cracked in a matter of seconds.
This was the first wrapped penny candy in America
What is the tootsie roll
What you should do if you receive a suspicious email in your CTI inbox. |
Forward it to ITsupport@commteam.org
What should you do if you think you have malware on your computer or believe your system is acting strange?
Contact IT Support at ITSupport@commteam.org or call us
What do you get if you divide the circumference of a pumpkin by it's diameter?
What is pumpkin (pie sign)
Which of the following passwords is the strongest? (a) Football1234 (b) BobsBakery5 (c) buddy1990 (d) I’llBeBack#571
(d) I’llBeBack#571
According to tradition, if a person wears his or her clothes inside out and then walks backwards on Halloween, he or she will see a what at midnight
What is a witch
Something you should do regularly to ensure you can restore your computer to a previous state if something goes wrong
What is backup your computer or data?