_____________________ is a hardware device used to create remote access VPNs.
_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.
__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.
____________________ is the process of having apps run in restricted memory areas.
________________ is a group which is dedicated to secure coding best practices for web applications.
_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.
Which of the below are authentication Protocols?
________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.
______________________ is the security layer of Wireless Application Protocol.
Hiding a message in some other medium like graphic image or sound file or text file is known as ________________
Question 1 of 10