Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-96 - Certified Application Security Engineer (CASE) JAVA

Page: 1 / 2
Total 47 questions

Which of the following is used to mapCustom Exceptions to Statuscode?

A.

@ResponseStatus

B.

@ResponseStatusCode

C.

@ResponseCode

D.

@ScacusCode

Which of the following relationship is used to describe security use case scenario?

A.

Threatens Relationship

B.

Extend Relationship

C.

Mitigates Relationship

D.

Include Relationship

It is recommended that you should not use return, break, continue or throw statements in _________

A.

Finally block

B.

Try-With-Resources block

C.

Try block

D.

Catch block

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

A.

Failure to Restrict URL

B.

Broken Authentication

C.

Unvalidated Redirects and Forwards

D.

Denial-of-Service [Do

Which of the following can be derived from abuse cases to elicit security requirements for software system?

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter("filename");

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath("/");

String PathVariable = "";

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

A.

URL Tampering vulnerability

B.

Form Tampering vulnerability

C.

XSS vulnerability

D.

Directory Traversal vulnerability

Which of the following relationship is used to describe abuse case scenarios?

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Which of the following method will help you check if DEBUG level is enabled?

A.

isDebugEnabled()

B.

EnableDebug ()

C.

IsEnableDebug ()

D.

DebugEnabled()

Identify the type of attack depicted in the figure below:

A.

XSS

B.

Cross-Site Request Forgery (CSRF) attack

C.

SQL injection attack

D.

Denial-of-Service attack

Identify the formula for calculating the risk during threat modeling.

A.

RISK = PROBABILITY "Attack

B.

RISK = PROBABILITY " ASSETS

C.

RISK = PROBABILITY * DAMAGE POTENTIAL

D.

IRISK = PROBABILITY * VULNERABILITY