A) Monitors and controls incoming and outgoing network traffic B) Takes photographs C) Records music D) Measures temperature
A) Using two different keyboards B) Verification method using two factors: something you know and something you have C) Writing two passwords D) Typing really fast
A) Software for data backup B) Software for photo editing C) Software for word processing D) Malware that encrypts files and demands payment for decryption
A) Process of identifying security weaknesses in a system B) Finding job opportunities C) Planning vacations D) Analyzing weather patterns
A) To enhance video streaming quality B) To change desktop backgrounds C) To fix security vulnerabilities and bugs D) To organize files
A) Repairing electronic devices B) Sorting documents alphabetically C) Secure online communication by encrypting data transmitted between a website and a user D) Creating music playlists
A) Technical support available 24/7 B) Software that has zero bugs C) Countdown to launch new products D) Security flaw that is unknown to the software vendor
A) Sharing passwords with friends B) Writing passwords on sticky notes C) Using strong, unique passwords for each account D) Reusing the same password |