Free 312-49V9 Exam Braindumps (page: 39)

Page 38 of 122

The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

  1. Presentation Layer
  2. Security Layer
  3. Discovery Layer
  4. Access Layer

Answer(s): C



Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software settings?

  1. HKEY_USERS
  2. HKEY_CURRENT_USER
  3. HKEY_LOCAL_MACHINE
  4. HKEY-CURRENT_CONFIG

Answer(s): C



Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?

  1. Event logs
  2. Audit logs
  3. Firewall logs
  4. IDS logs

Answer(s): A



WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?

  1. RC4-CCMP
  2. RC4-TKIP
  3. AES-CCMP
  4. AES-TKIP

Answer(s): C






Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

312-49V9 Discussions & Posts