1) Using strong passwords to secure accounts a) Phishing b) Firewall c) Password protection d) Two-factor authentication (2FA) 2) Fake emails or messages to steal personal data a) Phishing b) Data breach c) Encryption d) Firewall 3) Software that blocks unauthorized access a) Two-factor authentication (2FA) b) Firewall c) Data breach d) Password protection 4) A way to protect information by converting it into a secret code a) Phishing b) Password protection c) Two-factor authentication (2FA) d) Encryption 5) An extra security step for login a) Firewall b) Two-factor authentication (2FA) c) Encryption d) Data breach 6) When private information is leaked or stolen a) Data breach b) Firewall c) Password protection d) Phishing

Výsledková tabule/Žebříček

Vizuální styl

Možnosti

Přepnout šablonu

Obnovit automatické uložení: ?