1) Using strong passwords to secure accounts a) Phishing b) Firewall c) Password protection d) Two-factor authentication (2FA) 2) Fake emails or messages to steal personal data a) Phishing b) Data breach c) Encryption d) Firewall 3) Software that blocks unauthorized access a) Two-factor authentication (2FA) b) Firewall c) Data breach d) Password protection 4) A way to protect information by converting it into a secret code a) Phishing b) Password protection c) Two-factor authentication (2FA) d) Encryption 5) An extra security step for login a) Firewall b) Two-factor authentication (2FA) c) Encryption d) Data breach 6) When private information is leaked or stolen a) Data breach b) Firewall c) Password protection d) Phishing

Classifica

Stile di visualizzazione

Opzioni

Cambia modello

Ripristinare il titolo salvato automaticamente: ?