https://killexams.com/pass4sure/exam-detail/312-96
Download PDF for 312-96


312-96 MCQs

312-96 TestPrep

312-96 Study Guide

312-96 Practice Test

312-96 Exam Questions


killexams.com EC-COUNCIL 312-96


Certified Application Security Engineer (C|ASE Java) Certification


https://killexams.com/pass4sure/exam-detail/312-96

Download PDF for 312-96



Question: 56


Which of the following is a secure coding practice to prevent Remote Code Execution vulnerabilities?


  1. Allowing user-supplied input to be executed without proper validation

  2. Disabling input validation for code execution

  3. Implementing input validation and sanitization for code execution

  4. Using weak or common passwords




Answer: C


Explanation: Implementing input validation and sanitization for code execution is a secure coding practice to prevent Remote Code Execution vulnerabilities. By validating and sanitizing user-supplied input before executing it as code, the risk of malicious code execution can be mitigated. Allowing user-supplied input to be executed without proper validation, disabling input validation for code execution, and using weak or common passwords are insecure practices that can contribute to Remote Code Execution vulnerabilities.




Question: 57


Which of the following is a secure coding practice to prevent Security Vulnerabilities in third-party libraries?


  1. Using outdated and unpatched libraries

  2. Disabling input validation for libraries

  3. Storing sensitive data in plain text in the libraries

  4. Implementing regular updates and patching for libraries




Answer: D


Explanation: Implementing regular updates and patching for libraries is a secure coding practice to prevent Security Vulnerabilities in third-party libraries. By keeping libraries up to date and applying patches promptly, the application can address known vulnerabilities and reduce the risk of exploitation. Using outdated and unpatched libraries, disabling input validation for libraries, and storing sensitive data in plain text in the libraries are insecure practices that can contribute to security vulnerabilities.

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot.



Identify the security mistakes that the developer has coded?


  1. He is attempting to use client-side validation

  2. He is attempting to use whitelist input validation approach

  3. He is attempting to use regular expression for validation

  4. He is attempting to use blacklist input validation approach




Answer: D

Question: 59

Identify the type of attack depicted in the following figure.


  1. SQL Injection Attacks

  2. Session Fixation Attack

  3. Parameter Tampering Attack

  4. Denial-of-Service Attack




Answer: C

Question: 60

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:


  1. Catching incorrect exceptions

  2. Multiple catching of incorrect exceptions

  3. Re-throwing incorrect exceptions

  4. Throwing incorrect exceptions




Answer: D

Question: 61

Which of the threat classification model is used to classify threats during threat modeling process?


  1. RED

  2. STRIDE

  3. DREAD

  4. SMART




Answer: B

Which line of the following example of Java Code can make application vulnerable to a session attack?



  1. Line No. 1

  2. Line No. 3

  3. Line No. 4

  4. Line No. 5




Answer: B

Question: 63

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.


  1. < server port="" shutdown-"' >

  2. < server port="-1" shutdown-*" >

  3. < server port="-1" shutdown="SHUTDOWN" >

  4. < server port="8080" shutdown="SHUTDOWN" >




Answer: B

Question: 64

Which of the following method will help you check if DEBUG level is enabled?


  1. isDebugEnabled()

  2. EnableDebug ()

  3. IsEnableDebug ()

  4. DebugEnabled()




Answer: A

Question: 65


In which phase of secure development lifecycle the threat modeling is performed?


  1. Coding phase

  2. Testing phase

  3. Deployment phase

  4. Design phase




Answer: D

Question: 67

Identify the type of attack depicted in the figure below:



  1. XSS

  2. Cross-Site Request Forgery (CSRF) attack

  3. SQL injection attack

  4. Denial-of-Service attack




Answer: B


KILLEXAMS.COM


Killexams.com is a leading online platform specializing in high-quality certification exam preparation. Offering a robust suite of tools, including MCQs, practice tests, and advanced test engines, Killexams.com empowers candidates to excel in their certification exams. Discover the key features that make Killexams.com the go-to choice for exam success.



Exam Questions:

Killexams.com provides exam questions that are experienced in test centers. These questions are updated regularly to ensure they are up-to-date and relevant to the latest exam syllabus. By studying these questions, candidates can familiarize themselves with the content and format of the real exam.


Exam MCQs:

Killexams.com offers exam MCQs in PDF format. These questions contain a comprehensive

collection of questions and answers that cover the exam topics. By using these MCQs, candidate can enhance their knowledge and improve their chances of success in the certification exam.


Practice Test:

Killexams.com provides practice test through their desktop test engine and online test engine. These practice tests simulate the real exam environment and help candidates assess their readiness for the actual exam. The practice test cover a wide range of questions and enable candidates to identify their strengths and weaknesses.


thorough preparation:

Killexams.com offers a success guarantee with the exam MCQs. Killexams claim that by using this materials, candidates will pass their exams on the first attempt or they will get refund for the purchase price. This guarantee provides assurance and confidence to individuals preparing for certification exam.


Updated Contents:

Killexams.com regularly updates its question bank of MCQs to ensure that they are current and reflect the latest changes in the exam syllabus. This helps candidates stay up-to-date with the exam content and increases their chances of success.