CompTIA Security+ Practice Exam 5 SY0-401

CompTIA Security+ Practice Exam 5 SY0-401


_____________________ is a hardware device used to create remote access VPNs.

 

 

 

 

Which of the below are authentication Protocols?

 

 

 

 

____________________ is the process of having apps run in restricted memory areas.

 

 

 

 

_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.

 

 

 

 

________________ is a group which is dedicated to secure coding best practices for web applications.

 

 

 

 

__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.

 

 

 

 

Hiding a message in some other medium like graphic image or sound file or text file is known as ________________

 

 

 

 

_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.

 

 

 

 

________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.

 

 

 

 

______________________ is the security layer of Wireless Application Protocol.

 

 

 

 


Question 1 of 10

More Tests