A) Measures temperature B) Records music C) Monitors and controls incoming and outgoing network traffic D) Takes photographs
A) Verification method using two factors: something you know and something you have B) Using two different keyboards C) Writing two passwords D) Typing really fast
A) Software for data backup B) Malware that encrypts files and demands payment for decryption C) Software for word processing D) Software for photo editing
A) Planning vacations B) Process of identifying security weaknesses in a system C) Finding job opportunities D) Analyzing weather patterns
A) To fix security vulnerabilities and bugs B) To change desktop backgrounds C) To enhance video streaming quality D) To organize files
A) Sorting documents alphabetically B) Repairing electronic devices C) Secure online communication by encrypting data transmitted between a website and a user D) Creating music playlists
A) Technical support available 24/7 B) Software that has zero bugs C) Countdown to launch new products D) Security flaw that is unknown to the software vendor
A) Using strong, unique passwords for each account B) Sharing passwords with friends C) Writing passwords on sticky notes D) Reusing the same password |