Where did real mummies originate?
What is Ancient Egypt?
This malware misleads users of its true intent by disguising itself as a standard program
What is a Trojan?
Sending malicious or fraudulent emails pretending to be from someone else in order to gain access to data, such as personal information and passwords
What is phishing?
A combination of "tricky" characters to secure your account or device that no one else knows
What is a Password?
Halloween is the second most commercial holiday in the United States. Which holiday is No. 1?
A type of malware that tries to extort money from the victim.
What is ransomware?
When a "hacker" snoops on data or phone conversations
What is Eavesdropping/wiretapping?
The "properties" of secure information are depicted by what model?
What is the CIA Triad/Triangle/Model?
Which story originated the Headless Horseman?
What is The Legend of Sleepy Hollow?
A sneaky type of malware that secretly records your online activities and personal information.
What is Spyware?
A common attack where a person will attempt to figure out a password or other credentials to gain access to a
host.
What is Impersonation?
Contain updates for system or application files that fixes bugs or security problems
What is a Patch?
What is the least popular Halloween candy?
What is Candy Corn?
This malware secretly installs itself on your device and displays unwanted advertisements and pop-ups
What is Adware?
Getting users to reveal confidential information or obtaining unauthorized physical access to a resource.
What is Social Engineering?
Designing systems without single points of failure
What is Fault tolerance?
Who wrote the horror book Frankenstein?
Who is Mary Shelley?
Malware that records all the user’s keystrokes on the keyboard, typically storing the gathered information and sending it to the attacker, who is seeking sensitive information like usernames, passwords, or credit card details.
What is a Keylogger?
Combing through an organization's or an individual's refuse ("trash") to try to find useful documents.
What is Dumpster Diving?
The principle of allowing users as little access to a system as possible for them to complete their tasks
What is the principle of least privilege?