A) Takes photographs B) Monitors and controls incoming and outgoing network traffic C) Records music D) Measures temperature
A) Typing really fast B) Writing two passwords C) Verification method using two factors: something you know and something you have D) Using two different keyboards
A) Software for data backup B) Software for photo editing C) Software for word processing D) Malware that encrypts files and demands payment for decryption
A) Finding job opportunities B) Process of identifying security weaknesses in a system C) Planning vacations D) Analyzing weather patterns
A) To change desktop backgrounds B) To fix security vulnerabilities and bugs C) To organize files D) To enhance video streaming quality
A) Repairing electronic devices B) Creating music playlists C) Sorting documents alphabetically D) Secure online communication by encrypting data transmitted between a website and a user
A) Countdown to launch new products B) Security flaw that is unknown to the software vendor C) Technical support available 24/7 D) Software that has zero bugs
A) Using strong, unique passwords for each account B) Reusing the same password C) Writing passwords on sticky notes D) Sharing passwords with friends |