XML parsers are often the target attacks because they are the first portion of a Web service that processes input from other Web services. Poorly designed or configured XML parsers can be used to compromise the parser regardless of how secure the Web service is.
111. Which of the following are used to perform data inferences?
a.
Memory and CPU channelsb.
Exploitable and detectable channelsc.
Storage and timing channelsd.
Buffer and overt channels112. The Web service processing model securing simple object access control protocol (SOAP) messages and extensible markup language (XML) documents does
a.
Chain of auctioneersb.
Chain of providersc.
Chain of intermediariesd.
Chain of consumersThe other three choices deal with the Web services. The Web service processing model requires the ability to secure simple object access protocol (SOAP) messages and extensible markup language (XML) documents as they are forwarded along potentially long and complex chains of consumer, provider, and intermediary services. The nature of Web services processing makes those services subject to unique attacks, as well as variations on familiar attacks targeting Web servers.
113. Which of the following is not a single point-of-failure?
a.
Mesh topologyb.
Star topologyc.
Bus topologyd.
Tree topologyThe other three choices are subjected to a single point-of-failure. The single central hub in star and tree topology and the single cable in bus topology are vulnerable to a single point-of-failure.
114. Which of the following describes one process signaling information to another by modulating its own use of system resources in such a way that this manipulation affects the real response time observed by the second process?
a.
A communication channelb.
A covert storage channelc.
A covert timing channeld.
An exploitable channel115. Which of the following is
a.
Internetb.
Converged networkc.
Password synchronizationd.
Domain name system server