A) Monitors and controls incoming and outgoing network traffic B) Records music C) Takes photographs D) Measures temperature
A) Writing two passwords B) Using two different keyboards C) Verification method using two factors: something you know and something you have D) Typing really fast
A) Software for photo editing B) Malware that encrypts files and demands payment for decryption C) Software for word processing D) Software for data backup
A) Using strong, unique passwords for each account B) Writing passwords on sticky notes C) Reusing the same password D) Sharing passwords with friends
A) To change desktop backgrounds B) To organize files C) To fix security vulnerabilities and bugs D) To enhance video streaming quality
A) Secure online communication by encrypting data transmitted between a website and a user B) Sorting documents alphabetically C) Creating music playlists D) Repairing electronic devices
A) Planning vacations B) Analyzing weather patterns C) Process of identifying security weaknesses in a system D) Finding job opportunities
A) Technical support available 24/7 B) Security flaw that is unknown to the software vendor C) Software that has zero bugs D) Countdown to launch new products |