Define two-factor authentication and describe its benefits for mitigating cybercrime.
Recognize common privacy setting options and identify situations in which you may want to change them.
NEXT ➜