A) Takes photographs B) Monitors and controls incoming and outgoing network traffic C) Records music D) Measures temperature
A) Writing two passwords B) Verification method using two factors: something you know and something you have C) Typing really fast D) Using two different keyboards
A) Malware that encrypts files and demands payment for decryption B) Software for word processing C) Software for photo editing D) Software for data backup
A) Writing passwords on sticky notes B) Using strong, unique passwords for each account C) Reusing the same password D) Sharing passwords with friends
A) To enhance video streaming quality B) To fix security vulnerabilities and bugs C) To organize files D) To change desktop backgrounds
A) Repairing electronic devices B) Sorting documents alphabetically C) Secure online communication by encrypting data transmitted between a website and a user D) Creating music playlists
A) Planning vacations B) Analyzing weather patterns C) Finding job opportunities D) Process of identifying security weaknesses in a system
A) Security flaw that is unknown to the software vendor B) Countdown to launch new products C) Technical support available 24/7 D) Software that has zero bugs |