1) Using strong passwords to secure accounts a) Phishing b) Firewall c) Password protection d) Two-factor authentication (2FA) 2) Fake emails or messages to steal personal data a) Phishing b) Data breach c) Encryption d) Firewall 3) Software that blocks unauthorized access a) Two-factor authentication (2FA) b) Firewall c) Data breach d) Password protection 4) A way to protect information by converting it into a secret code a) Phishing b) Password protection c) Two-factor authentication (2FA) d) Encryption 5) An extra security step for login a) Firewall b) Two-factor authentication (2FA) c) Encryption d) Data breach 6) When private information is leaked or stolen a) Data breach b) Firewall c) Password protection d) Phishing

Tabela rankingowa

Motyw

Opcje

Zmień szablon

Przywrócić automatycznie zapisane ćwiczenie: ?