312-96 Dumps 312-96 Braindumps 312-96 Real Questions 312-96 Practice Test 312-96 Actual Questions EC-COUNCIL 312-96 Certified Application Security Engineer (C|ASE Java) Certification https://killexams.com/pass4sure/exam-detail/312-96 Question: 56 Which of the following is a secure coding practice to prevent Remote Code Execution vulnerabilities? A. Allowing user-supplied input to be executed without proper validation B. Disabling input validation for code execution C. Implementing input validation and sanitization for code execution D. Using weak or common passwords Answer: C Explanation: Implementing input validation and sanitization for code execution is a secure coding practice to prevent Remote Code Execution vulnerabilities. By validating and sanitizing user-supplied input before executing it as code, the risk of malicious code execution can be mitigated. Allowing user-supplied input to be executed without proper validation, disabling input validation for code execution, and using weak or common passwords are insecure practices that can contribute to Remote Code Execution vulnerabilities. Question: 57 Which of the following is a secure coding practice to prevent Security Vulnerabilities in third-party libraries? A. Using outdated and unpatched libraries B. Disabling input validation for libraries C. Storing sensitive data in plain text in the libraries D. Implementing regular updates and patching for libraries Answer: D Explanation: Implementing regular updates and patching for libraries is a secure coding practice to prevent Security Vulnerabilities in third-party libraries. By keeping libraries up to date and applying patches promptly, the application can address known vulnerabilities and reduce the risk of exploitation. Using outdated and unpatched libraries, disabling input validation for libraries, and storing sensitive data in plain text in the libraries are insecure practices that can contribute to security vulnerabilities. Question: 58 Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded? A. He is attempting to use client-side validation B. He is attempting to use whitelist input validation approach C. He is attempting to use regular expression for validation D. He is attempting to use blacklist input validation approach Answer: D Question: 59 Identify the type of attack depicted in the following figure. A. SQL Injection Attacks B. Session Fixation Attack C. Parameter Tampering Attack D. Denial-of-Service Attack Answer: C Question: 60 According to secure logging practices, programmers should ensure that logging processes are not disrupted by: A. Catching incorrect exceptions B. Multiple catching of incorrect exceptions C. Re-throwing incorrect exceptions D. Throwing incorrect exceptions Answer: D Question: 61 Which of the threat classification model is used to classify threats during threat modeling process? A. RED B. STRIDE C. DREAD D. SMART Answer: B Question: 62 Which line of the following example of Java Code can make application vulnerable to a session attack? A. Line No. 1 B. Line No. 3 C. Line No. 4 D. Line No. 5 Answer: B Question: 63 Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so. A. < server port="" shutdown-"' > B. < server port="-1" shutdown-*" > C. < server port="-1" shutdown="SHUTDOWN" > D. < server port="8080" shutdown="SHUTDOWN" > Answer: B Question: 64 Which of the following method will help you check if DEBUG level is enabled? A. isDebugEnabled() B. EnableDebug () C. IsEnableDebug () D. DebugEnabled() Answer: A Question: 65 Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel? A. < connector lsSSLEnabled="Yes" / > B. < connector EnableSSL="true" / > C. < connector SSLEnabled="false" / > D. < connector SSLEnabled="true" / > Answer: D Question: 66 In which phase of secure development lifecycle the threat modeling is performed? A. Coding phase B. Testing phase C. Deployment phase D. Design phase Answer: D Question: 67 Identify the type of attack depicted in the figure below: A. XSS B. Cross-Site Request Forgery (CSRF) attack C. SQL injection attack D. Denial-of-Service attack Answer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