Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

312-96 ECCouncil Certified Application Security Engineer (CASE) JAVA Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 312-96 Certified Application Security Engineer (CASE) JAVA certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 47 questions

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

A.

Denial-of-Service attack

B.

Client-Side Scripts Attack

C.

SQL Injection Attack

D.

Directory Traversal Attack

Identify the type of encryption depicted in the following figure.

A.

Asymmetric Encryption

B.

Digital Signature

C.

Symmetric Encryption

D.

Hashing

Which of the threat classification model is used to classify threats during threat modeling process?

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Which of the following can be derived from abuse cases to elicit security requirements for software system?

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

A developer to handle global exception should use _________ annotation along with @ExceptionHandler method annotation for any class

A.

@Advice

B.

@ControllerAdvice

C.

@globalControllerAdvice

D.

@GlobalAdvice

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

A.

< int-param > < param-name>directory-listinqs < param-value>true < /init-param >

B.

< int param > < param-name>directorv-listinqs < param-value>false < /init-param >

C.

< int-param > < param-name>listinqs < param-value>true < /init-param

D.

< int-param > < param-name>listinqs < param-value>false < /init-param >

Which line of the following example of Java Code can make application vulnerable to a session attack?

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

The software developer has implemented encryption in the code as shown in the following screenshot.

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?

A.

MD5

B.

SHA-1

C.

Triple DES

D.

AES

Which of the following relationship is used to describe abuse case scenarios?

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

A.

Try-Catch-Finally block

B.

Try-Catch block

C.

Try-With-Resources block

D.

Try-Catch-Resources block

Which of the following configuration settings in server.xml will allow Tomcat server administrator to impose limit on uploading file based on their size?

A.

< connector... maxFileLimit="file size" / >

B.

< connector... maxPostSize="0"/>

C.

< connector... maxFileSize="file size" / >

D.

< connector... maxPostSize="file size" / >

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

A.

Failure to Restrict URL

B.

Broken Authentication

C.

Unvalidated Redirects and Forwards

D.

Denial-of-Service [Do

It is recommended that you should not use return, break, continue or throw statements in _________

A.

Finally block

B.

Try-With-Resources block

C.

Try block

D.

Catch block

Identify the type of attack depicted in the following figure.

A.

SQL Injection Attacks

B.

Session Fixation Attack

C.

Parameter Tampering Attack

D.

Denial-of-Service Attack

Page: 1 / 1
Total 47 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved