<< Prev Question Next Question >>

Question 144/180

The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (180q)
Question 1: The Recycle Bin is located on the Windows desktop. When you ...
Question 2: Injection flaws are web application vulnerabilities that all...
Question 3: What is the First Step required in preparing a computer for ...
Question 4: Tracks numbering on a hard disk begins at 0 from the outer e...
Question 5: What document does the screenshot represent? (Exhibit)...
Question 6: JPEG is a commonly used method of compressing photographic I...
Question 7: Which one of the following statements is not correct while p...
Question 8: Mobile phone forensics is the science of recovering digital ...
Question 9: Deposition enables opposing counsel to preview an expert wit...
Question 10: When a system is compromised, attackers often try to disable...
Question 11: Email archiving is a systematic approach to save and protect...
Question 12: MAC filtering is a security access control methodology, wher...
Question 13: Attackers can manipulate variables that reference files with...
Question 14: The disk in the disk drive rotates at high speed, and heads ...
Question 15: Which of the following is not correct when documenting an el...
Question 16: Which of the following attacks allows an attacker to access ...
Question 17: Which of the following email headers specifies an address fo...
Question 18: Which device in a wireless local area network (WLAN) determi...
Question 19: When collecting electronic evidence at the crime scene, the ...
Question 20: Which of the following approaches checks and compares all th...
Question 21: Windows Security Event Log contains records of login/logout ...
Question 22: Which root folder (hive) of registry editor contains a vast ...
Question 23: In Windows 7 system files, which file reads the Boot.ini fil...
Question 24: An intrusion detection system (IDS) gathers and analyzes inf...
Question 25: You have been given the task to investigate web attacks on a...
Question 26: Which of the following standard is based on a legal preceden...
Question 27: Determine the message length from following hex viewer recor...
Question 28: You should always work with original evidence...
Question 29: Wireless access control attacks aim to penetrate a network b...
Question 30: Which is not a part of environmental conditions of a forensi...
Question 31: A computer forensic report is a report which provides detail...
Question 32: The Recycle Bin exists as a metaphor for throwing files away...
Question 33: An attack vector is a path or means by which an attacker can...
Question 34: When dealing with the powered-off computers at the crime sce...
Question 35: A system with a simple logging mechanism has not been given ...
Question 36: Which of the following network attacks refers to sending hug...
Question 37: Which of the following statements does not support the case ...
Question 38: What is a chain of custody?
Question 39: Files stored in the Recycle Bin in its physical location are...
Question 40: Computer security logs contain information about the events ...
Question 41: At the time of evidence transfer, both sender and receiver n...
Question 42: Microsoft Security IDs are available in Windows Registry Edi...
Question 43: FAT32 is a 32-bit version of FAT file system using smaller c...
Question 44: Event correlation is a procedure that is assigned with a new...
Question 45: Digital evidence validation involves using a hashing algorit...
Question 46: Log management includes all the processes and techniques use...
Question 47: Digital evidence is not fragile in nature....
Question 48: Computer forensics report provides detailed information on c...
Question 49: What is the "Best Evidence Rule"?...
Question 50: Physical security recommendations: There should be only one ...
Question 51: Which of the following reports are delivered under oath to a...
Question 52: Dumpster Diving refers to:
Question 53: File signature analysis involves collecting information from...
Question 54: The Apache server saves diagnostic information and error mes...
Question 55: In which step of the computer forensics investigation method...
Question 56: Which of the following steganography types hides the secret ...
Question 57: Steganography is a technique of hiding a secret message with...
Question 58: Data acquisition system is a combination of tools or process...
Question 59: First response to an incident may involve three different gr...
Question 60: Which of the following commands shows you the username and I...
Question 61: Consistency in the investigative report is more important th...
Question 62: Who is responsible for the following tasks? Secure the scene...
Question 63: Network forensics allows Investigators to inspect network tr...
Question 64: Ever-changing advancement or mobile devices increases the co...
Question 65: Data Acquisition is the process of imaging or otherwise obta...
Question 66: International Mobile Equipment Identifier (IMEI) is a 15-dlg...
Question 67: When a file or folder is deleted, the complete path, includi...
Question 68: During first responder procedure you should follow all laws ...
Question 69: Windows Security Accounts Manager (SAM) is a registry file w...
Question 70: Which of the following is not a part of disk imaging tool re...
Question 71: Shortcuts are the files with the extension .Ink that are cre...
Question 72: How do you define forensic computing?...
Question 73: Subscriber Identity Module (SIM) is a removable component th...
Question 74: Netstat is a tool for collecting Information regarding netwo...
Question 75: An expert witness is a witness, who by virtue of education, ...
Question 76: LBA (Logical Block Address) addresses data by allotting a __...
Question 77: The ARP table of a router comes in handy for Investigating n...
Question 78: Wi-Fi Protected Access (WPA) is a data encryption method for...
Question 79: Data is striped at a byte level across multiple drives and p...
Question 80: Identify the attack from following sequence of actions? Step...
Question 81: Ron. a computer forensics expert, Is Investigating a case in...
Question 82: When collecting evidence from the RAM, where do you look for...
Question 83: Networks are vulnerable to an attack which occurs due to ove...
Question 84: A mobile operating system is the operating system that opera...
Question 85: Which of the following file in Novel GroupWise stores inform...
Question 86: Which of the following password cracking techniques works li...
Question 87: Which of the following statements is incorrect related to ac...
Question 88: Syslog is a client/server protocol standard for forwarding l...
Question 89: When the operating system marks cluster as used, but does no...
Question 90: Centralized logging is defined as gathering the computer sys...
Question 91: A mobile operating system manages communication between the ...
Question 92: What is the goal of forensic science?...
Question 93: What is a SCSI (Small Computer System Interface)?...
Question 94: The status of the network interface cards (NICs) connected t...
Question 95: Depending upon the Jurisdictional areas, different laws appl...
Question 96: Recovery of the deleted partition is the process by which th...
Question 97: What is a first sector ("sector zero") of a hard disk?...
Question 98: What is static executable file analysis?...
Question 99: Smith, as a part his forensic investigation assignment, has ...
Question 100: Which of the following commands shows you the names of all o...
Question 101: Which of the following would you consider an aspect of organ...
Question 102: What is the smallest allocation unit of a hard disk?...
Question 103: Graphics Interchange Format (GIF) is a ___________RGB bitmap...
Question 104: Damaged portions of a disk on which no read/Write operation ...
Question 105: Data files from original evidence should be used for forensi...
Question 106: A forensic investigator is a person who handles the complete...
Question 107: Which of the following is not an example of a cyber-crime?...
Question 108: Task list command displays a list of applications and servic...
Question 109: How do you define Technical Steganography?...
Question 110: Why is it Important to consider health and safety factors in...
Question 111: You can interact with the Registry through intermediate prog...
Question 112: TCP/IP (Transmission Control Protocol/Internet Protocol) is ...
Question 113: If the partition size Is 4 GB, each cluster will be 32 K Eve...
Question 114: Which one of the following is not a consideration in a foren...
Question 115: Which of the following is the certifying body of forensics l...
Question 116: A swap file is a space on a hard disk used as the virtual me...
Question 117: Which of the following passwords are sent over the wire (and...
Question 118: Quality of a raster Image is determined by the _____________...
Question 119: SMTP (Simple Mail Transfer protocol) receives outgoing mail ...
Question 120: Cyber-crime is defined as any Illegal act involving a gun, a...
Question 121: Hard disk data addressing is a method of allotting addresses...
Question 122: All the Information about the user activity on the network, ...
Question 123: According to US federal rules, to present a testimony in a c...
Question 124: An image is an artifact that reproduces the likeness of some...
Question 125: Which of the following statement is not correct when dealing...
Question 126: During the seizure of digital evidence, the suspect can be a...
Question 127: Raw data acquisition format creates ____________of a data se...
Question 128: The Electronic Serial Number (ESN) is a unique __________ re...
Question 129: A rogue/unauthorized access point is one that Is not authori...
Question 130: Which wireless standard has bandwidth up to 54 Mbps and sign...
Question 131: System software password cracking is defined as cracking the...
Question 132: BMP (Bitmap) is a standard file format for computers running...
Question 133: Which of the following commands shows you all of the network...
Question 134: Which table is used to convert huge word lists (i .e. dictio...
Question 135: Web applications provide an Interface between end users and ...
Question 136: Which of the following attacks allows attacker to acquire ac...
Question 137: If a file (readme.txt) on a hard disk has a size of 2600 byt...
Question 138: The IIS log file format is a fixed (cannot be customized) AS...
Question 139: Under no circumstances should anyone, with the exception of ...
Question 140: Hash injection attack allows attackers to inject a compromis...
Question 141: Jason, a renowned forensic investigator, is investigating a ...
Question 142: A steganographic file system is a method to store the files ...
Question 143: Which of the following statements is incorrect when preservi...
Question 144: The evolution of web services and their increasing use in bu...
Question 145: Smith, an employee of a reputed forensic Investigation firm,...
Question 146: Which of the following is not a part of the technical specif...
Question 147: In what circumstances would you conduct searches without a w...
Question 148: SIM is a removable component that contains essential informa...
Question 149: What is cold boot (hard boot)?
Question 150: Email spoofing refers to:
Question 151: Which Is a Linux journaling file system?...
Question 152: Buffer Overflow occurs when an application writes more data ...
Question 153: File deletion is a way of removing a file from a computer's ...
Question 154: Digital photography helps in correcting the perspective of t...
Question 155: The need for computer forensics is highlighted by an exponen...
Question 156: Computer security logs contain information about the events ...
Question 157: An Internet standard protocol (built on top of TCP/IP) that ...
Question 158: What is the first step that needs to be carried out to inves...
Question 159: Network forensics can be defined as the sniffing, recording,...
Question 160: P0P3 (Post Office Protocol 3) is a standard protocol for rec...
Question 161: Router log files provide detailed Information about the netw...
Question 162: What is a bit-stream copy?
Question 163: Which of the following is not a part of data acquisition for...
Question 164: First responder is a person who arrives first at the crime s...
Question 165: Which of the following log injection attacks uses white spac...
Question 166: Volatile information can be easily modified or lost when the...
Question 167: Which of the following statements is not a part of securing ...
Question 168: Which of the following Steganography techniques allows you t...
Question 169: What is the first step that needs to be carried out to crack...
Question 170: WPA2 provides enterprise and Wi-Fi users with stronger data ...
Question 171: When NTFS Is formatted, the format program assigns the _____...
Question 172: Data compression involves encoding the data to take up less ...
Question 173: Operating System logs are most beneficial for Identifying or...
Question 174: Which of the following Wi-Fi chalking methods refers to draw...
Question 175: Billy, a computer forensics expert, has recovered a large nu...
Question 176: Attacker uses vulnerabilities in the authentication or sessi...
Question 177: Wireless network discovery tools use two different methodolo...
Question 178: Email archiving is a systematic approach to save and protect...
Question 179: Which of the following commands shows you the NetBIOS name t...
Question 180: In an echo data hiding technique, the secret message is embe...