New Year Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ECCouncil 312-96 Dumps

Page: 1 / 5
Total 47 questions

Certified Application Security Engineer (CASE) JAVA Questions and Answers

Question 1

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

Options:

A.

< server port="" shutdown-"' >

B.

< server port="-1" shutdown-*" >

C.

< server port="-1" shutdown="SHUTDOWN" >

D.

< server port="8080" shutdown="SHUTDOWN" >

Question 2

Which of the threat classification model is used to classify threats during threat modeling process?

Options:

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Question 3

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

Options:

A.

ex.StackTrace.getError();

B.

ex.message();

C.

ex.getMessage();

D.

ex.getError();

Question 4

The software developer has implemented encryption in the code as shown in the following screenshot.

as

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?

Options:

A.

MD5

B.

SHA-1

C.

Triple DES

D.

AES

Question 5

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

Options:

A.

Failure to Restrict URL

B.

Broken Authentication

C.

Unvalidated Redirects and Forwards

D.

Denial-of-Service [Do

Question 6

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

Options:

A.

DREAD

B.

SMART

C.

STRIDE

D.

RED

Question 7

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Question 8

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

as

Options:

A.

Denial-of-Service attack

B.

Client-Side Scripts Attack

C.

SQL Injection Attack

D.

Directory Traversal Attack

Question 9

Which of the following relationship is used to describe abuse case scenarios?

Options:

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Question 10

Oliver is a web server admin and wants to configure the Tomcat server in such a way that it should not serve index pages in the absence of welcome files. Which of the following settings in CATALINA_HOME/conf/ in web.xml will solve his problem?

Options:

A.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name > < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > false < /param-value > < /init-param > < load-on-startup > 1 < /load-on-startup > < servlet >

B.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name > < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > disable < /param-value> < /init-param > < load-on-startup > 1 < /load-on-startup> < /servlet >

C.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name>< param-value> 0 < /param value>< /init-param > < init-param > < param-name> listings < /param-name > < param-value > enable < /param-value > < /init-param > < load-on-startup> 1 < /load-on-startup > < /servlet >

D.

< servlet > < servlet-name > default < servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name> < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > true < /param-value > < /init-param > < load-on-startup > l < /load-on-startup > < /servlet >

Question 11

A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?

as

Options:

A.

Maintained session by creating a Session variable user with value stored in uname variable.

B.

Maintained session by creating a HTTP variable user with value stored in uname variable.

C.

Maintained session by creating a Cookie user with value stored in uname variable.

D.

Maintained session by creating a hidden variable user with value stored in uname variable.

Question 12

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter("filename");

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath("/");

String PathVariable = "";

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

Options:

A.

URL Tampering vulnerability

B.

Form Tampering vulnerability

C.

XSS vulnerability

D.

Directory Traversal vulnerability

Question 13

Identify the type of attack depicted in the following figure.

as

Options:

A.

Denial-of-service attack

B.

SQL Injection attack

C.

Directory Traversal Attack

D.

Form Tampering Attack

Question 14

A developer to handle global exception should use _________ annotation along with @ExceptionHandler method annotation for any class

Options:

A.

@Advice

B.

@ControllerAdvice

C.

@globalControllerAdvice

D.

@GlobalAdvice

Page: 1 / 5
Total 47 questions