A) Monitors and controls incoming and outgoing network traffic B) Measures temperature C) Takes photographs D) Records music
A) Using two different keyboards B) Writing two passwords C) Typing really fast D) Verification method using two factors: something you know and something you have
A) Software for data backup B) Software for photo editing C) Malware that encrypts files and demands payment for decryption D) Software for word processing
A) Process of identifying security weaknesses in a system B) Planning vacations C) Finding job opportunities D) Analyzing weather patterns
A) To change desktop backgrounds B) To fix security vulnerabilities and bugs C) To enhance video streaming quality D) To organize files
A) Sorting documents alphabetically B) Secure online communication by encrypting data transmitted between a website and a user C) Repairing electronic devices D) Creating music playlists
A) Security flaw that is unknown to the software vendor B) Technical support available 24/7 C) Software that has zero bugs D) Countdown to launch new products
A) Sharing passwords with friends B) Writing passwords on sticky notes C) Reusing the same password D) Using strong, unique passwords for each account |