Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ECCouncil > Application Security > 312-96

312-96 Certified Application Security Engineer (CASE) JAVA Question and Answers

Question # 4

Which of the following DFD component is used to represent the change in privilege levels?

A.

3

B.

4

C.

1

D.

2

Full Access
Question # 5

Which line of the following example of Java Code can make application vulnerable to a session attack?

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

Full Access
Question # 6

Which of the following relationship is used to describe security use case scenario?

A.

Threatens Relationship

B.

Extend Relationship

C.

Mitigates Relationship

D.

Include Relationship

Full Access
Question # 7

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

A.

DREAD

B.

SMART

C.

STRIDE

D.

RED

Full Access
Question # 8

In which phase of secure development lifecycle the threat modeling is performed?

A.

Coding phase

B.

Testing phase

C.

Deployment phase

D.

Design phase

Full Access
Question # 9

Which of the following configurations can help you avoid displaying server names in server response header?

A.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort= "8443" / >

B.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName=" disable" redirectPort="8443" / >

C.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" Server = " " redirectPort="8443" / >

D.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName ="null " redirectPort="8443'' / >

Full Access
Question # 10

Which of the following relationship is used to describe abuse case scenarios?

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Full Access
Question # 11

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:

A.

Catching incorrect exceptions

B.

Multiple catching of incorrect exceptions

C.

Re-throwing incorrect exceptions

D.

Throwing incorrect exceptions

Full Access
Question # 12

Identify the type of attack depicted in the figure below:

A.

SQL injection attack

B.

Parameter/form attack

C.

Directory traversal attack

D.

Session fixation attack

Full Access
Question # 13

Which of the following can be derived from abuse cases to elicit security requirements for software system?

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Full Access
Question # 14

Which of the threat classification model is used to classify threats during threat modeling process?

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Full Access