A) Records music B) Takes photographs C) Monitors and controls incoming and outgoing network traffic D) Measures temperature
A) Verification method using two factors: something you know and something you have B) Using two different keyboards C) Writing two passwords D) Typing really fast
A) Malware that encrypts files and demands payment for decryption B) Software for data backup C) Software for photo editing D) Software for word processing
A) Analyzing weather patterns B) Process of identifying security weaknesses in a system C) Finding job opportunities D) Planning vacations
A) To change desktop backgrounds B) To enhance video streaming quality C) To organize files D) To fix security vulnerabilities and bugs
A) Secure online communication by encrypting data transmitted between a website and a user B) Repairing electronic devices C) Sorting documents alphabetically D) Creating music playlists
A) Software that has zero bugs B) Security flaw that is unknown to the software vendor C) Countdown to launch new products D) Technical support available 24/7
A) Sharing passwords with friends B) Reusing the same password C) Using strong, unique passwords for each account D) Writing passwords on sticky notes |