ExamGecko
Home / ECCouncil / 312-96
Ask Question

312-96: Certified Application Security Engineer (CASE) JAVA

Vendor:
Exam Questions:
47
 Learners
  2.370
Last Updated
February - 2025
Language
English
2 Quizzes
PDF | VPLUS

Exam Number: 312-96

Exam Name: Certified Application Security Engineer (CASE) JAVA

Length of test: 120 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: 50 questions

Passing Score: 70%

Skill:

  1. Understanding Application Security: Threats, attacks, and the importance of security in the software development lifecycle (SDLC).

  2. Security Requirements Gathering: Identifying and documenting security requirements.

  3. Secure Application Design and Architecture: Designing applications with security in mind.

  4. Secure Coding Practices: Best practices for input validation, authentication, authorization, cryptography, session management, and error handling.

  5. Static and Dynamic Application Security Testing (SAST & DAST): Techniques for identifying vulnerabilities in applications.

  6. Secure Deployment and Maintenance: Ensuring applications remain secure throughout their lifecycle.

This study guide should help you understand what to expect on 312-96 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Identify the type of encryption depicted in the following figure.

ECCouncil 312-96 image Question 12 25315 09182024185534000000

Asymmetric Encryption
Asymmetric Encryption
Digital Signature
Digital Signature
Symmetric Encryption
Symmetric Encryption
Hashing
Hashing
Suggested answer: C
asked 18/09/2024
Ricardo Andres
30 questions

Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp

< form Id='form1' method='post' action='SearchProperty.jsp' >

< input type='text' id=''txt_Search' name='txt_Search' placeholder='Search Property...' / >

< input type='Submit' Id='Btn_Search' value='Search' / >

< /form >

However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?

He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
He should write code like out.write (('You Searched for:' +(search));
He should write code like out.write (('You Searched for:' +(search));
Suggested answer: A
asked 18/09/2024
Mahmoud Ismail
34 questions

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

ECCouncil 312-96 image Question 8 25311 09182024185534000000

Denial-of-Service attack
Denial-of-Service attack
Client-Side Scripts Attack
Client-Side Scripts Attack
SQL Injection Attack
SQL Injection Attack
Directory Traversal Attack
Directory Traversal Attack
Suggested answer: B
asked 18/09/2024
NSANG Cyril
34 questions

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

ECCouncil 312-96 image Question 10 25313 09182024185534000000

He is trying to use Whitelisting Input Validation
He is trying to use Whitelisting Input Validation
He is trying to use Non-parametrized SQL query
He is trying to use Non-parametrized SQL query
He is trying to use Blacklisting Input Validation
He is trying to use Blacklisting Input Validation
He is trying to use Parametrized SQL Query
He is trying to use Parametrized SQL Query
Suggested answer: B
asked 18/09/2024
Glen Makhuvele
36 questions

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

ex.StackTrace.getError();
ex.StackTrace.getError();
ex.message();
ex.message();
ex.getMessage();
ex.getMessage();
ex.getError();
ex.getError();
Suggested answer: C
asked 18/09/2024
Aneez vezhappilly
34 questions

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

Session Hijacking attack
Session Hijacking attack
Cross Site Request Forgery attack
Cross Site Request Forgery attack
SQL Injection attack
SQL Injection attack
Brute force attack
Brute force attack
Suggested answer: C
asked 18/09/2024
Bryan Sprowls
34 questions

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

< server port='' shutdown-'' >
< server port='' shutdown-'' >
< server port='-1' shutdown-*' >
< server port='-1' shutdown-*' >
< server port='-1' shutdown='SHUTDOWN' >
< server port='-1' shutdown='SHUTDOWN' >
< server port='8080' shutdown='SHUTDOWN' >
< server port='8080' shutdown='SHUTDOWN' >
Suggested answer: B
asked 18/09/2024
Nicole Stevens
44 questions

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

Failure to Restrict URL
Failure to Restrict URL
Broken Authentication
Broken Authentication
Unvalidated Redirects and Forwards
Unvalidated Redirects and Forwards
Denial-of-Service [Do
Denial-of-Service [Do
Suggested answer: D
asked 18/09/2024
Osama Rahman
28 questions

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Become a Premium Member for full access
  Unlock Premium Member

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

ECCouncil 312-96 image Question 3 25306 09182024185534000000

He wants to transfer the entire data over encrypted channel
He wants to transfer the entire data over encrypted channel
He wants to transfer only response parameter data over encrypted channel
He wants to transfer only response parameter data over encrypted channel
He wants to transfer only request parameter data over encrypted channel
He wants to transfer only request parameter data over encrypted channel
He wants to transfer only Session cookies over encrypted channel
He wants to transfer only Session cookies over encrypted channel
Suggested answer: A
asked 18/09/2024
Kayode Omotosho
40 questions