Drag the tiles to the correct boxes to complete the pairs.
Match each online security guideline with the correct example of its use.
using an identity-monitoring service
using incognito mode
using an authenticator app
using a password manager
An individual uses a shared computer and does not
want their web browser activity recorded.
An individual purchases a feature with an anti-malware
software that checks if new financial accounts have been
created in their name without their permission.
An individual wants to keep all their credentials in
one place to make it easier to log into websites.
An individual needs a second form of authentication
to make their bank logins more secure.



Answer :