Hiding a message in some other medium like graphic image or sound file or text file is known as ________________
__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.
____________________ is the process of having apps run in restricted memory areas.
______________________ is the security layer of Wireless Application Protocol.
________________ is a group which is dedicated to secure coding best practices for web applications.
_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.
Which of the below are authentication Protocols?
_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.
________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.
_____________________ is a hardware device used to create remote access VPNs.
Question 1 of 10