A) Monitors and controls incoming and outgoing network traffic B) Records music C) Measures temperature D) Takes photographs
A) Writing two passwords B) Using two different keyboards C) Verification method using two factors: something you know and something you have D) Typing really fast
A) Software for word processing B) Software for photo editing C) Software for data backup D) Malware that encrypts files and demands payment for decryption
A) Planning vacations B) Finding job opportunities C) Process of identifying security weaknesses in a system D) Analyzing weather patterns
A) To enhance video streaming quality B) To change desktop backgrounds C) To organize files D) To fix security vulnerabilities and bugs
A) Sorting documents alphabetically B) Creating music playlists C) Repairing electronic devices D) Secure online communication by encrypting data transmitted between a website and a user
A) Technical support available 24/7 B) Software that has zero bugs C) Countdown to launch new products D) Security flaw that is unknown to the software vendor
A) Reusing the same password B) Sharing passwords with friends C) Using strong, unique passwords for each account D) Writing passwords on sticky notes |