Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-96 - Certified Application Security Engineer (CASE) JAVA

Page: 2 / 2
Total 47 questions

Which of the following DFD component is used to represent the change in privilege levels?

A.

3

B.

4

C.

1

D.

2

To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?

A.

valid ate-'true"

B.

lsNotvalidate="disabled"

C.

lsNotvalidate="false"

D.

validate="enabled"

Which line of the following example of Java Code can make application vulnerable to a session attack?

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

Identify the type of encryption depicted in the following figure.

A.

Asymmetric Encryption

B.

Digital Signature

C.

Symmetric Encryption

D.

Hashing