CompTIA Security+ Practice Exam 5 SY0-401

CompTIA Security+ Practice Exam 5 SY0-401


Which of the below are authentication Protocols?

 
 
 
 

_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.

 
 
 
 

_____________________ is a hardware device used to create remote access VPNs.

 
 
 
 

_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.

 
 
 
 

________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.

 
 
 
 

______________________ is the security layer of Wireless Application Protocol.

 
 
 
 

__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.

 
 
 
 

Hiding a message in some other medium like graphic image or sound file or text file is known as ________________

 
 
 
 

____________________ is the process of having apps run in restricted memory areas.

 
 
 
 

________________ is a group which is dedicated to secure coding best practices for web applications.

 
 
 
 


Question 1 of 10


More Tests