New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.19 Exam - Topic 3 Question 50 Discussion

Actual exam question for Arcitura Education's S90.19 exam
Question #: 50
Topic #: 3
[All S90.19 Questions]

Service A's logic has been implemented using managed code. An attacker sends an XML bomb to Service A . As a result, Service A's memory consumption started increasing at an alarming rate and then decreased back to normal. The service was not affected by this attack and quickly recovered. Which of the following attacks were potentially avoided?

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

0/2000 characters
Thomasena
4 months ago
Managed code usually helps prevent those kinds of attacks.
upvoted 0 times
...
Reita
4 months ago
Not so sure about that, could be a buffer overrun too.
upvoted 0 times
...
Paulina
4 months ago
Surprised it handled an XML bomb so well!
upvoted 0 times
...
Mica
4 months ago
I agree, the service recovered too quickly for it to be anything else.
upvoted 0 times
...
Rikki
5 months ago
Definitely a denial of service attack.
upvoted 0 times
...
Farrah
5 months ago
Okay, the grok filter is looking for a SYSLOGBASE followed by "new node" and an IPORHOST. I think I can figure this out if I break down the log message options.
upvoted 0 times
...
Reyes
5 months ago
Okay, I've got a strategy for this. The question is asking if the use of MSPs increases a blockchain's vulnerability to Denial of Service attacks. So I need to consider how MSPs might centralize the blockchain and how that could impact its resistance to DoS attacks.
upvoted 0 times
...
Micaela
5 months ago
Wait, I'm not sure about this. I need to review the material on request sets again.
upvoted 0 times
...
Kenia
5 months ago
I was leaning towards C, especially since we talked about how multiple destination IPs could suggest a botnet attack. It feels right, but my memory is fuzzy on the specifics!
upvoted 0 times
...
Remedios
5 months ago
I'm not totally confident on this, but I think it has to do with the metric used by each routing protocol. The router would compare the metrics to determine the best path.
upvoted 0 times
...

Save Cancel