CompTIA Security+ Practice Exam 5 SY0-401

CompTIA Security+ Practice Exam 5 SY0-401


Hiding a message in some other medium like graphic image or sound file or text file is known as ________________

 
 
 
 

__________________ is a authentication protocols that gets its name from a mythical three headed dog who stood ate gates of Hades.

 
 
 
 

____________________ is the process of having apps run in restricted memory areas.

 
 
 
 

______________________ is the security layer of Wireless Application Protocol.

 
 
 
 

________________ is a group which is dedicated to secure coding best practices for web applications.

 
 
 
 

_________________ is like a burglar alarm that is configured to evaluate system logs, see for any suspicious network activity and to disconnect sessions that are suspectable to causing harm or violate security.

 
 
 
 

Which of the below are authentication Protocols?

 
 
 
 

_________________________ is an IDS that detects an intrusion and reacts by blocking the communication from that IP address.

 
 
 
 

________________ allows taking an image of a working system at a particular point which can be used to revert the machine to a saved state.

 
 
 
 

_____________________ is a hardware device used to create remote access VPNs.

 
 
 
 


Question 1 of 10


More Tests

Search

Shortcodes Ultimate

 
Follow Us
 
BGP