New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ECCouncil 312-96 Certified Application Security Engineer (CASE) JAVA Exam Practice Test

Page: 1 / 5
Total 47 questions

Certified Application Security Engineer (CASE) JAVA Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

Options:

A.

Denial-of-Service attack

B.

Client-Side Scripts Attack

C.

SQL Injection Attack

D.

Directory Traversal Attack

Question 2

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter("filename");

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath("/");

String PathVariable = "";

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

Options:

A.

URL Tampering vulnerability

B.

Form Tampering vulnerability

C.

XSS vulnerability

D.

Directory Traversal vulnerability

Question 3

Which of the following can be derived from abuse cases to elicit security requirements for software system?

Options:

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Question 4

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Question 5

The developer wants to remove the HttpSessionobject and its values from the client' system.

Which of the following method should he use for the above purpose?

Options:

A.

sessionlnvalidateil

B.

Invalidate(session JSESSIONID)

C.

isValidateQ

D.

invalidateQ

Question 6

Which of the threat classification model is used to classify threats during threat modeling process?

Options:

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Question 7

A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?

Options:

A.

Maintained session by creating a Session variable user with value stored in uname variable.

B.

Maintained session by creating a HTTP variable user with value stored in uname variable.

C.

Maintained session by creating a Cookie user with value stored in uname variable.

D.

Maintained session by creating a hidden variable user with value stored in uname variable.

Question 8

Which of the following relationship is used to describe abuse case scenarios?

Options:

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Question 9

Which line of the following example of Java Code can make application vulnerable to a session attack?

Options:

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

Question 10

The software developer has implemented encryption in the code as shown in the following screenshot.

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?

Options:

A.

MD5

B.

SHA-1

C.

Triple DES

D.

AES

Question 11

Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

Options:

A.

Ted was depicting abuse cases

B.

Ted was depicting abstract use cases

C.

Ted was depicting lower-level use cases

D.

Ted was depicting security use cases

Question 12

Identify the type of encryption depicted in the following figure.

Options:

A.

Asymmetric Encryption

B.

Digital Signature

C.

Symmetric Encryption

D.

Hashing

Question 13

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

Options:

A.

DREAD

B.

SMART

C.

STRIDE

D.

RED

Question 14

Identify the type of attack depicted in the following figure.

Options:

A.

Denial-of-service attack

B.

SQL Injection attack

C.

Directory Traversal Attack

D.

Form Tampering Attack

Page: 1 / 5
Total 47 questions