Pass the ECCouncil Application Security 312-96 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

Question # 1

Options:

A.

He wants to transfer the entire data over encrypted channel


B.

He wants to transfer only response parameter data over encrypted channel


C.

He wants to transfer only request parameter data over encrypted channel


D.

He wants to transfer only Session cookies over encrypted channel


Expert Solution
Questions # 2:

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?

Options:

A.

< connector lsSSLEnabled="Yes" / >


B.

< connector EnableSSL="true" / >


C.

< connector SSLEnabled="false" / >


D.

< connector SSLEnabled="true" / >


Expert Solution
Questions # 3:

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

Question # 3

Options:

A.

Denial-of-Service attack


B.

Client-Side Scripts Attack


C.

SQL Injection Attack


D.

Directory Traversal Attack


Expert Solution
Questions # 4:

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?

Question # 4

Options:

A.

He is attempting to use client-side validation


B.

He is attempting to use whitelist input validation approach


C.

He is attempting to use regular expression for validation


D.

He is attempting to use blacklist input validation approach


Expert Solution
Questions # 5:

Identify the type of attack depicted in the figure below:

Question # 5

Options:

A.

SQL injection attack


B.

Parameter/form attack


C.

Directory traversal attack


D.

Session fixation attack


Expert Solution
Questions # 6:

Oliver is a web server admin and wants to configure the Tomcat server in such a way that it should not serve index pages in the absence of welcome files. Which of the following settings in CATALINA_HOME/conf/ in web.xml will solve his problem?

Options:

A.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name > < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > false < /param-value > < /init-param > < load-on-startup > 1 < /load-on-startup > < servlet >


B.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name > < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > disable < /param-value> < /init-param > < load-on-startup > 1 < /load-on-startup> < /servlet >


C.

< servlet > < servlet-name > default < /servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name>< param-value> 0 < /param value>< /init-param > < init-param > < param-name> listings < /param-name > < param-value > enable < /param-value > < /init-param > < load-on-startup> 1 < /load-on-startup > < /servlet >


D.

< servlet > < servlet-name > default < servlet-name > < servlet-class > org.apache.catalina.servlets.DefaultServlet < /servlet-class > < init-param > < param-name > debug < /param-name> < param-value > 0 < /param-value > < /init-param > < init-param > < param-name > listings < /param-name > < param-value > true < /param-value > < /init-param > < load-on-startup > l < /load-on-startup > < /servlet >


Expert Solution
Questions # 7:

In which phase of secure development lifecycle the threat modeling is performed?

Options:

A.

Coding phase


B.

Testing phase


C.

Deployment phase


D.

Design phase


Expert Solution
Questions # 8:

Which of the following DFD component is used to represent the change in privilege levels?

Question # 8

Options:

A.

3


B.

4


C.

1


D.

2


Expert Solution
Questions # 9:

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Options:

A.

Try-Catch-Finally block


B.

Try-Catch block


C.

Try-With-Resources block


D.

Try-Catch-Resources block


Expert Solution
Questions # 10:

Which of the following authentication mechanism does J2EE support?

Options:

A.

Windows, Form based. Role Based, Client/Server Mutual Authentication


B.

Role Based, Http Basic, Windows, Http Digest Authentication


C.

Http Basic, Form Based, Client/Server Mutual, Role Based Authentication


D.

Http Basic, Form Based, Client/Server Mutual, HTTP Digest Authentication


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions