A) Measures temperature B) Takes photographs C) Records music D) Monitors and controls incoming and outgoing network traffic
A) Using two different keyboards B) Verification method using two factors: something you know and something you have C) Writing two passwords D) Typing really fast
A) Software for photo editing B) Software for data backup C) Software for word processing D) Malware that encrypts files and demands payment for decryption
A) Planning vacations B) Process of identifying security weaknesses in a system C) Finding job opportunities D) Analyzing weather patterns
A) To fix security vulnerabilities and bugs B) To change desktop backgrounds C) To enhance video streaming quality D) To organize files
A) Creating music playlists B) Repairing electronic devices C) Secure online communication by encrypting data transmitted between a website and a user D) Sorting documents alphabetically
A) Countdown to launch new products B) Security flaw that is unknown to the software vendor C) Technical support available 24/7 D) Software that has zero bugs
A) Writing passwords on sticky notes B) Sharing passwords with friends C) Reusing the same password D) Using strong, unique passwords for each account |