Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

ECCouncil 312-96 Dumps

Page: 1 / 4
Total 47 questions

Certified Application Security Engineer (CASE) JAVA Questions and Answers

Question 1

Identify the type of attack depicted in the following figure.

Options:

A.

Denial-of-service attack

B.

SQL Injection attack

C.

Directory Traversal Attack

D.

Form Tampering Attack

Question 2

Which of the following relationship is used to describe security use case scenario?

Options:

A.

Threatens Relationship

B.

Extend Relationship

C.

Mitigates Relationship

D.

Include Relationship

Question 3

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

Options:

A.

DREAD

B.

SMART

C.

STRIDE

D.

RED

Question 4

Which of the following authentication mechanism does J2EE support?

Options:

A.

Windows, Form based. Role Based, Client/Server Mutual Authentication

B.

Role Based, Http Basic, Windows, Http Digest Authentication

C.

Http Basic, Form Based, Client/Server Mutual, Role Based Authentication

D.

Http Basic, Form Based, Client/Server Mutual, HTTP Digest Authentication

Question 5

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Options:

A.

Try-Catch-Finally block

B.

Try-Catch block

C.

Try-With-Resources block

D.

Try-Catch-Resources block

Question 6

Identify the formula for calculating the risk during threat modeling.

Options:

A.

RISK = PROBABILITY "Attack

B.

RISK = PROBABILITY " ASSETS

C.

RISK = PROBABILITY * DAMAGE POTENTIAL

D.

IRISK = PROBABILITY * VULNERABILITY

Question 7

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Question 8

Which of the following can be derived from abuse cases to elicit security requirements for software system?

Options:

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Question 9

Which line of the following example of Java Code can make application vulnerable to a session attack?

Options:

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

Question 10

In which phase of secure development lifecycle the threat modeling is performed?

Options:

A.

Coding phase

B.

Testing phase

C.

Deployment phase

D.

Design phase

Question 11

Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.

Which type of security assessment activity Jacob is currently performing?

Options:

A.

ISCST

B.

CAST

C.

CAST

D.

SAST

Question 12

Which of the threat classification model is used to classify threats during threat modeling process?

Options:

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Question 13

To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?

Options:

A.

valid ate-'true"

B.

lsNotvalidate="disabled"

C.

lsNotvalidate="false"

D.

validate="enabled"

Question 14

The software developer has implemented encryption in the code as shown in the following screenshot.

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?

Options:

A.

MD5

B.

SHA-1

C.

Triple DES

D.

AES

Page: 1 / 4
Total 47 questions