A) Monitors and controls incoming and outgoing network traffic B) Records music C) Takes photographs D) Measures temperature
A) Verification method using two factors: something you know and something you have B) Writing two passwords C) Typing really fast D) Using two different keyboards
A) Malware that encrypts files and demands payment for decryption B) Software for photo editing C) Software for data backup D) Software for word processing
A) Process of identifying security weaknesses in a system B) Finding job opportunities C) Analyzing weather patterns D) Planning vacations
A) To fix security vulnerabilities and bugs B) To enhance video streaming quality C) To organize files D) To change desktop backgrounds
A) Creating music playlists B) Sorting documents alphabetically C) Secure online communication by encrypting data transmitted between a website and a user D) Repairing electronic devices
A) Countdown to launch new products B) Security flaw that is unknown to the software vendor C) Software that has zero bugs D) Technical support available 24/7
A) Sharing passwords with friends B) Using strong, unique passwords for each account C) Writing passwords on sticky notes D) Reusing the same password |