New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil Application Security 312-96 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

Question # 1

Options:

A.

He wants to transfer the entire data over encrypted channel


B.

He wants to transfer only response parameter data over encrypted channel


C.

He wants to transfer only request parameter data over encrypted channel


D.

He wants to transfer only Session cookies over encrypted channel


Expert Solution
Questions # 2:

The software developer has implemented encryption in the code as shown in the following screenshot.

Question # 2

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?

Options:

A.

MD5


B.

SHA-1


C.

Triple DES


D.

AES


Expert Solution
Questions # 3:

Which of the following method will help you check if DEBUG level is enabled?

Options:

A.

isDebugEnabled()


B.

EnableDebug ()


C.

IsEnableDebug ()


D.

DebugEnabled()


Expert Solution
Questions # 4:

Which line of the following example of Java Code can make application vulnerable to a session attack?

Question # 4

Options:

A.

Line No. 1


B.

Line No. 3


C.

Line No. 4


D.

Line No. 5


Expert Solution
Questions # 5:

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?

Options:

A.

< connector lsSSLEnabled="Yes" / >


B.

< connector EnableSSL="true" / >


C.

< connector SSLEnabled="false" / >


D.

< connector SSLEnabled="true" / >


Expert Solution
Questions # 6:

Identify the type of attack depicted in the following figure.

Question # 6

Options:

A.

SQL Injection Attacks


B.

Session Fixation Attack


C.

Parameter Tampering Attack


D.

Denial-of-Service Attack


Expert Solution
Questions # 7:

Which of the following is used to mapCustom Exceptions to Statuscode?

Options:

A.

@ResponseStatus


B.

@ResponseStatusCode


C.

@ResponseCode


D.

@ScacusCode


Expert Solution
Questions # 8:

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

Options:

A.

Session Hijacking attack


B.

Cross Site Request Forgery attack


C.

SQL Injection attack


D.

Brute force attack


Expert Solution
Questions # 9:

Identify the formula for calculating the risk during threat modeling.

Options:

A.

RISK = PROBABILITY "Attack


B.

RISK = PROBABILITY " ASSETS


C.

RISK = PROBABILITY * DAMAGE POTENTIAL


D.

IRISK = PROBABILITY * VULNERABILITY


Expert Solution
Questions # 10:

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

Options:

A.

Attack Surface Evaluation


B.

Threat Classification


C.

Threat Identification


D.

Impact Analysis


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions