Which of the following security scan technique used to deal with malicious XML requests that have the potential to steal critical data or completely damage the server's web service?

46. Which of the following security scan technique used to deal with malicious XML requests that have the potential to steal critical data or completely damage the server's web service?

  1. Malformed XML
  2. Custom Script
  3. XML Bomb
  4. Cross-site scripting

Answer: C) XML Bomb

Explanation:

security scan technique used to deal with malicious XML requests that have the potential to steal critical data or completely damage the server's web service.

Comments and Discussions!

Load comments ↻






Copyright © 2024 www.includehelp.com. All rights reserved.