CompTIA Security+ Practice Exam 5 SY0-401

CompTIA Security+ Practice Exam 5 SY0-401

Which of the below are authentication Protocols?


Hiding a message in some other medium like graphic image or sound file or text file is known as ________________


_____________________ is a hardware device used to create remote access VPNs.


______________________ is the security layer of Wireless Application Protocol.


____________________ is the process of having apps run in restricted memory areas.


__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.


________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.


_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.


________________ is a group which is dedicated to secure coding best practices for web applications.


_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.


Question 1 of 10

More Tests

Shortcodes Ultimate

Follow Us