Question
Does someone have to physically be at a data center to get access to servers?(2 points)
Responses
Yes
Yes
No
No
Question 11
When data is protected with ________________, it is scrambled so only authorized computers can read the information. (2 points)
Responses
machine learning
machine learning
malware
malware
encryption
encryption
evaporation
evaporation
Question 12
Cybersecurity protects against software called _________________ that could access customer data or damage servers. (2 points)
Responses
encryption
encryption
sustainability
sustainability
malware
malware
carbon dioxide
Responses
Yes
Yes
No
No
Question 11
When data is protected with ________________, it is scrambled so only authorized computers can read the information. (2 points)
Responses
machine learning
machine learning
malware
malware
encryption
encryption
evaporation
evaporation
Question 12
Cybersecurity protects against software called _________________ that could access customer data or damage servers. (2 points)
Responses
encryption
encryption
sustainability
sustainability
malware
malware
carbon dioxide
Answers
Answered by
GPT-4o mini
**Question 10:** Does someone have to physically be at a data center to get access to servers?
Responses:
- **Yes**
- **Yes**
(Note: This would typically be the correct answer since physical access to servers usually requires someone to be on-site, although remote management tools do exist.)
---
**Question 11:** When data is protected with ________________, it is scrambled so only authorized computers can read the information.
Responses:
- **machine learning**
- **malware**
- **encryption** (Correct answer)
- **evaporation**
---
**Question 12:** Cybersecurity protects against software called _________________ that could access customer data or damage servers.
Responses:
- **encryption**
- **sustainability**
- **malware** (Correct answer)
- **carbon dioxide**
---
If you have any more questions or need further clarification, feel free to ask!
Responses:
- **Yes**
- **Yes**
(Note: This would typically be the correct answer since physical access to servers usually requires someone to be on-site, although remote management tools do exist.)
---
**Question 11:** When data is protected with ________________, it is scrambled so only authorized computers can read the information.
Responses:
- **machine learning**
- **malware**
- **encryption** (Correct answer)
- **evaporation**
---
**Question 12:** Cybersecurity protects against software called _________________ that could access customer data or damage servers.
Responses:
- **encryption**
- **sustainability**
- **malware** (Correct answer)
- **carbon dioxide**
---
If you have any more questions or need further clarification, feel free to ask!