A) Measures temperature B) Monitors and controls incoming and outgoing network traffic C) Records music D) Takes photographs
A) Verification method using two factors: something you know and something you have B) Using two different keyboards C) Writing two passwords D) Typing really fast
A) Software for word processing B) Software for data backup C) Malware that encrypts files and demands payment for decryption D) Software for photo editing
A) Finding job opportunities B) Process of identifying security weaknesses in a system C) Planning vacations D) Analyzing weather patterns
A) To enhance video streaming quality B) To change desktop backgrounds C) To organize files D) To fix security vulnerabilities and bugs
A) Creating music playlists B) Repairing electronic devices C) Secure online communication by encrypting data transmitted between a website and a user D) Sorting documents alphabetically
A) Technical support available 24/7 B) Countdown to launch new products C) Software that has zero bugs D) Security flaw that is unknown to the software vendor
A) Using strong, unique passwords for each account B) Writing passwords on sticky notes C) Sharing passwords with friends D) Reusing the same password |