A) Records music B) Monitors and controls incoming and outgoing network traffic C) Takes photographs D) Measures temperature
A) Typing really fast B) Writing two passwords C) Using two different keyboards D) Verification method using two factors: something you know and something you have
A) Malware that encrypts files and demands payment for decryption B) Software for photo editing C) Software for data backup D) Software for word processing
A) Analyzing weather patterns B) Process of identifying security weaknesses in a system C) Finding job opportunities D) Planning vacations
A) To fix security vulnerabilities and bugs B) To enhance video streaming quality C) To change desktop backgrounds D) To organize files
A) Sorting documents alphabetically B) Creating music playlists C) Repairing electronic devices D) Secure online communication by encrypting data transmitted between a website and a user
A) Countdown to launch new products B) Software that has zero bugs C) Security flaw that is unknown to the software vendor D) Technical support available 24/7
A) Writing passwords on sticky notes B) Sharing passwords with friends C) Using strong, unique passwords for each account D) Reusing the same password |