A) Records music B) Takes photographs C) Monitors and controls incoming and outgoing network traffic D) Measures temperature
A) Using two different keyboards B) Writing two passwords C) Verification method using two factors: something you know and something you have D) Typing really fast
A) Software for word processing B) Malware that encrypts files and demands payment for decryption C) Software for photo editing D) Software for data backup
A) Planning vacations B) Process of identifying security weaknesses in a system C) Finding job opportunities D) Analyzing weather patterns
A) To change desktop backgrounds B) To organize files C) To enhance video streaming quality D) To fix security vulnerabilities and bugs
A) Repairing electronic devices B) Secure online communication by encrypting data transmitted between a website and a user C) Sorting documents alphabetically D) Creating music playlists
A) Technical support available 24/7 B) Countdown to launch new products C) Security flaw that is unknown to the software vendor D) Software that has zero bugs
A) Sharing passwords with friends B) Reusing the same password C) Writing passwords on sticky notes D) Using strong, unique passwords for each account |