A) Takes photographs B) Records music C) Monitors and controls incoming and outgoing network traffic D) Measures temperature
A) Writing two passwords B) Verification method using two factors: something you know and something you have C) Using two different keyboards D) Typing really fast
A) Malware that encrypts files and demands payment for decryption B) Software for word processing C) Software for photo editing D) Software for data backup
A) Process of identifying security weaknesses in a system B) Finding job opportunities C) Planning vacations D) Analyzing weather patterns
A) To enhance video streaming quality B) To organize files C) To fix security vulnerabilities and bugs D) To change desktop backgrounds
A) Repairing electronic devices B) Sorting documents alphabetically C) Creating music playlists D) Secure online communication by encrypting data transmitted between a website and a user
A) Software that has zero bugs B) Technical support available 24/7 C) Security flaw that is unknown to the software vendor D) Countdown to launch new products
A) Writing passwords on sticky notes B) Using strong, unique passwords for each account C) Sharing passwords with friends D) Reusing the same password |