Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-96 Exam Dumps - ECCouncil Application Security Questions and Answers

Question # 4

Identify the type of attack depicted in the figure below:

Options:

A.

SQL injection attack

B.

Parameter/form attack

C.

Directory traversal attack

D.

Session fixation attack

Buy Now
Question # 5

Which of the following DFD component is used to represent the change in privilege levels?

Options:

A.

3

B.

4

C.

1

D.

2

Buy Now
Question # 6

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Buy Now
Question # 7

Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.

Which type of security assessment activity Jacob is currently performing?

Options:

A.

ISCST

B.

CAST

C.

CAST

D.

SAST

Buy Now
Question # 8

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

Options:

A.

< int-param > < param-name>directory-listinqs < param-value>true < /init-param >

B.

< int param > < param-name>directorv-listinqs < param-value>false < /init-param >

C.

< int-param > < param-name>listinqs < param-value>true < /init-param

D.

< int-param > < param-name>listinqs < param-value>false < /init-param >

Buy Now
Question # 9

Which of the following configurations can help you avoid displaying server names in server response header?

Options:

A.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort= "8443" / >

B.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName=" disable" redirectPort="8443" / >

C.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" Server = " " redirectPort="8443" / >

D.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName ="null " redirectPort="8443'' / >

Buy Now
Question # 10

Which of the following relationship is used to describe security use case scenario?

Options:

A.

Threatens Relationship

B.

Extend Relationship

C.

Mitigates Relationship

D.

Include Relationship

Buy Now
Question # 11

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

Options:

A.

Failure to Restrict URL

B.

Broken Authentication

C.

Unvalidated Redirects and Forwards

D.

Denial-of-Service [Do

Buy Now
Question # 12

To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?

Options:

A.

valid ate-'true"

B.

lsNotvalidate="disabled"

C.

lsNotvalidate="false"

D.

validate="enabled"

Buy Now
Question # 13

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

Options:

A.

Attack Surface Evaluation

B.

Threat Classification

C.

Threat Identification

D.

Impact Analysis

Buy Now
Exam Code: 312-96
Exam Name: Certified Application Security Engineer (CASE) JAVA
Last Update: Feb 23, 2025
Questions: 47
312-96 pdf

312-96 PDF

$25.5  $84.99
312-96 Engine

312-96 Testing Engine

$28.5  $94.99
312-96 PDF + Engine

312-96 PDF + Testing Engine

$40.5  $134.99