1) Using strong passwords to secure accounts a) Phishing b) Firewall c) Password protection d) Two-factor authentication (2FA) 2) Fake emails or messages to steal personal data a) Phishing b) Data breach c) Encryption d) Firewall 3) Software that blocks unauthorized access a) Two-factor authentication (2FA) b) Firewall c) Data breach d) Password protection 4) A way to protect information by converting it into a secret code a) Phishing b) Password protection c) Two-factor authentication (2FA) d) Encryption 5) An extra security step for login a) Firewall b) Two-factor authentication (2FA) c) Encryption d) Data breach 6) When private information is leaked or stolen a) Data breach b) Firewall c) Password protection d) Phishing

Bestenliste

Visueller Stil

Einstellungen

Vorlage ändern

Soll die automatisch gespeicherte Aktivität wiederhergestellt werden?