Free Arcitura Education S90.19 Questions
-
-
Page: 1/17
Total 83 Questions
Question No 1
Which of the following types of attack always affect the availability of a service?
Question No 2
The use of XML schemas for data validation helps avoid several types of data - centric threats.
Question No 3
The use of session keys and symmetric cryptography results in:
Question No 4
An alternative to using a ___________ is to use a __________.
Question No 5
Service A's logic has been implemented using managed code. An attacker sends an XML bomb to Service A . As a result, Service A's memory consumption started increasing at an alarming rate and then decreased back to normal. The service was not affected by this attack and quickly recovered. Which of the following attacks were potentially avoided?
-
Page: 1/17
Total 83 Questions
-