ExamGecko

312-96: Certified Application Security Engineer (CASE) JAVA

Certified Application Security Engineer (CASE) JAVA
Vendor:

ECCouncil

Certified Application Security Engineer (CASE) JAVA Exam Questions: 47
Certified Application Security Engineer (CASE) JAVA   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: 312-96

Exam Name: Certified Application Security Engineer (CASE) JAVA

Length of test: 120 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: 50 questions

Passing Score: 70%

Skill:

  1. Understanding Application Security: Threats, attacks, and the importance of security in the software development lifecycle (SDLC).

  2. Security Requirements Gathering: Identifying and documenting security requirements.

  3. Secure Application Design and Architecture: Designing applications with security in mind.

  4. Secure Coding Practices: Best practices for input validation, authentication, authorization, cryptography, session management, and error handling.

  5. Static and Dynamic Application Security Testing (SAST & DAST): Techniques for identifying vulnerabilities in applications.

  6. Secure Deployment and Maintenance: Ensuring applications remain secure throughout their lifecycle.

This study guide should help you understand what to expect on 312-96 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Identify the type of encryption depicted in the following figure.

A.
Asymmetric Encryption
A.
Asymmetric Encryption
Answers
B.
Digital Signature
B.
Digital Signature
Answers
C.
Symmetric Encryption
C.
Symmetric Encryption
Answers
D.
Hashing
D.
Hashing
Answers
Suggested answer: C
asked 18/09/2024
Ricardo Andres
30 questions

Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp

< form Id='form1' method='post' action='SearchProperty.jsp' >

< input type='text' id=''txt_Search' name='txt_Search' placeholder='Search Property...' / >

< input type='Submit' Id='Btn_Search' value='Search' / >

< /form >

However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?

A.
He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
A.
He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
Answers
B.
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
B.
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
Answers
C.
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
C.
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
Answers
D.
He should write code like out.write (('You Searched for:' +(search));
D.
He should write code like out.write (('You Searched for:' +(search));
Answers
Suggested answer: A
asked 18/09/2024
Mahmoud Ismail
34 questions

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

A.
Denial-of-Service attack
A.
Denial-of-Service attack
Answers
B.
Client-Side Scripts Attack
B.
Client-Side Scripts Attack
Answers
C.
SQL Injection Attack
C.
SQL Injection Attack
Answers
D.
Directory Traversal Attack
D.
Directory Traversal Attack
Answers
Suggested answer: B
asked 18/09/2024
NSANG Cyril
34 questions

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

A.
He is trying to use Whitelisting Input Validation
A.
He is trying to use Whitelisting Input Validation
Answers
B.
He is trying to use Non-parametrized SQL query
B.
He is trying to use Non-parametrized SQL query
Answers
C.
He is trying to use Blacklisting Input Validation
C.
He is trying to use Blacklisting Input Validation
Answers
D.
He is trying to use Parametrized SQL Query
D.
He is trying to use Parametrized SQL Query
Answers
Suggested answer: B
asked 18/09/2024
Glen Makhuvele
36 questions

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

A.
ex.StackTrace.getError();
A.
ex.StackTrace.getError();
Answers
B.
ex.message();
B.
ex.message();
Answers
C.
ex.getMessage();
C.
ex.getMessage();
Answers
D.
ex.getError();
D.
ex.getError();
Answers
Suggested answer: C
asked 18/09/2024
Aneez vezhappilly
34 questions

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

A.
Session Hijacking attack
A.
Session Hijacking attack
Answers
B.
Cross Site Request Forgery attack
B.
Cross Site Request Forgery attack
Answers
C.
SQL Injection attack
C.
SQL Injection attack
Answers
D.
Brute force attack
D.
Brute force attack
Answers
Suggested answer: C
asked 18/09/2024
Bryan Sprowls
34 questions

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

A.
< server port='' shutdown-'' >
A.
< server port='' shutdown-'' >
Answers
B.
< server port='-1' shutdown-*' >
B.
< server port='-1' shutdown-*' >
Answers
C.
< server port='-1' shutdown='SHUTDOWN' >
C.
< server port='-1' shutdown='SHUTDOWN' >
Answers
D.
< server port='8080' shutdown='SHUTDOWN' >
D.
< server port='8080' shutdown='SHUTDOWN' >
Answers
Suggested answer: B
asked 18/09/2024
Nicole Stevens
44 questions

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

A.
Failure to Restrict URL
A.
Failure to Restrict URL
Answers
B.
Broken Authentication
B.
Broken Authentication
Answers
C.
Unvalidated Redirects and Forwards
C.
Unvalidated Redirects and Forwards
Answers
D.
Denial-of-Service [Do
D.
Denial-of-Service [Do
Answers
Suggested answer: D
asked 18/09/2024
Osama Rahman
28 questions

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

A.
He wants to transfer the entire data over encrypted channel
A.
He wants to transfer the entire data over encrypted channel
Answers
B.
He wants to transfer only response parameter data over encrypted channel
B.
He wants to transfer only response parameter data over encrypted channel
Answers
C.
He wants to transfer only request parameter data over encrypted channel
C.
He wants to transfer only request parameter data over encrypted channel
Answers
D.
He wants to transfer only Session cookies over encrypted channel
D.
He wants to transfer only Session cookies over encrypted channel
Answers
Suggested answer: A
asked 18/09/2024
Kayode Omotosho
40 questions