CompTIA Security+ Practice Exam 5 SY0-401 CompTIA Security+ Practice Exam 5 SY0-401 _____________________ is a hardware device used to create remote access VPNs. A. VPN concentrator B. Router C. Firewall D. Switch Which of the below are authentication Protocols? A. PAP B. CHAP C. POP D. SPAP ____________________ is the process of having apps run in restricted memory areas. A. Sandboxing B. Seaboxing C. Sanddusting D. Memory Leaking _________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security. A. VPN B. VLAN C. IPS D. IDS ________________ is a group which is dedicated to secure coding best practices for web applications. A. Honeypot B. OWASP C. IEEE D. ANSI __________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades. A. PAP B. CHAP C. Kerberos D. SPAP Hiding a message in some other medium like graphic image or sound file or text file is known as ________________ A. Cinematography B. Photography C. Pornography D. Steganography _________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address. A. VLAN B. IPS C. VPN D. None of the above ________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state. A. Image shot B. Screenshot C. Snapshot D. File shot ______________________ is the security layer of Wireless Application Protocol. A. WPA B. WTLS C. WEP D. WPA2 Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test