Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

312-96 Certified Application Security Engineer (CASE) JAVA Questions and Answers

Questions 4

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Buy Now
Questions 5

Suppose there is a productList.jsp page, which displays the list of products from the database for the requested product category. The product category comes as a request parameter value. Which of the following line of code will you use to strictly validate request parameter value before processing it for execution?

Options:

A.

public boolean validateUserName() {String CategoryId= request.getParameter("CatId");}

B.

public boolean validateUserName() { Pattern p = Pattern.compile("[a-zA-Z0-9]*$"); Matcher m = p.matcher(request.getParameter(CatId")); boolean result = m.matches(); return result;}

C.

public boolean validateUserName() { if(request.getParameter("CatId")!=null ) String CategoryId=request.getParameter("CatId");}

D.

public.boolean validateUserName() { if(!request.getParamcter("CatId").equals("null"))}

Buy Now
Questions 6

Which of the threat classification model is used to classify threats during threat modeling process?

Options:

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Buy Now
Questions 7

To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?

312-96 Question 7

Options:

A.

valid ate-'true"

B.

lsNotvalidate="disabled"

C.

lsNotvalidate="false"

D.

validate="enabled"

Buy Now
Questions 8

Identify the type of attack depicted in the following figure.

312-96 Question 8

Options:

A.

Denial-of-service attack

B.

SQL Injection attack

C.

Directory Traversal Attack

D.

Form Tampering Attack

Buy Now
Questions 9

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

312-96 Question 9

Options:

A.

He is trying to use Whitelisting Input Validation

B.

He is trying to use Non-parametrized SQL query

C.

He is trying to use Blacklisting Input Validation

D.

He is trying to use Parametrized SQL Query

Buy Now
Questions 10

Which of the following relationship is used to describe security use case scenario?

Options:

A.

Threatens Relationship

B.

Extend Relationship

C.

Mitigates Relationship

D.

Include Relationship

Buy Now
Questions 11

Identify the type of attack depicted in the following figure.

312-96 Question 11

Options:

A.

SQL Injection Attacks

B.

Session Fixation Attack

C.

Parameter Tampering Attack

D.

Denial-of-Service Attack

Buy Now
Questions 12

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter("filename");

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath("/");

String PathVariable = "";

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

Options:

A.

URL Tampering vulnerability

B.

Form Tampering vulnerability

C.

XSS vulnerability

D.

Directory Traversal vulnerability

Buy Now
Questions 13

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Options:

A.

Try-Catch-Finally block

B.

Try-Catch block

C.

Try-With-Resources block

D.

Try-Catch-Resources block

Buy Now
Questions 14

Identify what should NOT be catched while handling exceptions.

Options:

A.

EOFException

B.

SecurityException

C.

IllegalAccessException

D.

NullPointerException

Buy Now
Exam Code: 312-96
Exam Name: Certified Application Security Engineer (CASE) JAVA
Last Update: Nov 21, 2024
Questions: 47

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now 312-96 testing engine

PDF (Q&A)

$35  $99.99
buy now 312-96 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024