Which of the following types of attack always affect the availability of a service?
Question No 2
The use of XML schemas for data validation helps avoid several types of data - centric threats.
Question No 3
The use of session keys and symmetric cryptography results in:
Question No 4
An alternative to using a ___________ is to use a __________.
Question No 5
Service A's logic has been implemented using managed code. An attacker sends an XML bomb to
Service A . As a result, Service A's memory consumption started increasing at an alarming rate and
then decreased back to normal. The service was not affected by this attack and quickly recovered.
Which of the following attacks were potentially avoided?