Question 16

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?
  • Question 17

    A DDoS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.
    Which attack is being described here?
  • Question 18

    Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).
    Which of the following is an incorrect definition or characteristics of the protocol?
  • Question 19

    Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected.
    Now, Clark gains access to Steven's iPhone through the infected computer and is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the communication zone.
    Which of the following attacks is performed by Clark in above scenario?
  • Question 20

    While testing a web application in development, you notice that the web server does not properly ignore the
    "dot dot slash" (../) character string and instead returns the file listing of a folder structure of the server.
    What kind of attack is possible in this scenario?