A) Takes photographs B) Measures temperature C) Monitors and controls incoming and outgoing network traffic D) Records music
A) Typing really fast B) Using two different keyboards C) Verification method using two factors: something you know and something you have D) Writing two passwords
A) Software for photo editing B) Malware that encrypts files and demands payment for decryption C) Software for data backup D) Software for word processing
A) Process of identifying security weaknesses in a system B) Finding job opportunities C) Analyzing weather patterns D) Planning vacations
A) To organize files B) To enhance video streaming quality C) To change desktop backgrounds D) To fix security vulnerabilities and bugs
A) Repairing electronic devices B) Secure online communication by encrypting data transmitted between a website and a user C) Creating music playlists D) Sorting documents alphabetically
A) Software that has zero bugs B) Security flaw that is unknown to the software vendor C) Technical support available 24/7 D) Countdown to launch new products
A) Writing passwords on sticky notes B) Sharing passwords with friends C) Using strong, unique passwords for each account D) Reusing the same password |