ExamGecko
Home / ECCouncil / 312-96 / List of questions
Ask Question

ECCouncil 312-96 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Identify what should NOT be catched while handling exceptions.


SecurityException
SecurityException
IllegalAccessException
IllegalAccessException
NullPointerException
NullPointerException
EOFException
EOFException
Suggested answer: A
asked 18/09/2024
Khaled Mohamed Abdraboh Metwalli
36 questions

Question 2

Report Export Collapse

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

ex.StackTrace.getError();
ex.StackTrace.getError();
ex.message();
ex.message();
ex.getMessage();
ex.getMessage();
ex.getError();
ex.getError();
Suggested answer: C
asked 18/09/2024
Aneez vezhappilly
37 questions

Question 3

Report Export Collapse

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

ECCouncil 312-96 image Question 3 25306 09182024185534000000

He wants to transfer the entire data over encrypted channel
He wants to transfer the entire data over encrypted channel
He wants to transfer only response parameter data over encrypted channel
He wants to transfer only response parameter data over encrypted channel
He wants to transfer only request parameter data over encrypted channel
He wants to transfer only request parameter data over encrypted channel
He wants to transfer only Session cookies over encrypted channel
He wants to transfer only Session cookies over encrypted channel
Suggested answer: A
asked 18/09/2024
Kayode Omotosho
46 questions

Question 4

Report Export Collapse

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter('filename');

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath('/');

String PathVariable = '';

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

URL Tampering vulnerability
URL Tampering vulnerability
Form Tampering vulnerability
Form Tampering vulnerability
XSS vulnerability
XSS vulnerability
Directory Traversal vulnerability
Directory Traversal vulnerability
Suggested answer: D
asked 18/09/2024
Tony Minjarez
45 questions

Question 5

Report Export Collapse

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

Failure to Restrict URL
Failure to Restrict URL
Broken Authentication
Broken Authentication
Unvalidated Redirects and Forwards
Unvalidated Redirects and Forwards
Denial-of-Service [Do
Denial-of-Service [Do
Suggested answer: D
asked 18/09/2024
Osama Rahman
33 questions

Question 6

Report Export Collapse

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

DREAD
DREAD
SMART
SMART
STRIDE
STRIDE
RED
RED
Suggested answer: C
asked 18/09/2024
Michael Grisonichi
43 questions

Question 7

Report Export Collapse

Which of the following Spring Security Framework configuration setting will ensure the protection from session fixation attacks by not allowing authenticated user to login again?

session-fixation-protection ='newSessionlD'
session-fixation-protection ='newSessionlD'
session-fixation-protection ='.
session-fixation-protection ='.
session-fixation-protection ='enabled'
session-fixation-protection ='enabled'
session-fixation-protection ='.
session-fixation-protection ='.
Suggested answer: B
asked 18/09/2024
Aleksei Chernikov
55 questions

Question 8

Report Export Collapse

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

ECCouncil 312-96 image Question 8 25311 09182024185534000000

Denial-of-Service attack
Denial-of-Service attack
Client-Side Scripts Attack
Client-Side Scripts Attack
SQL Injection Attack
SQL Injection Attack
Directory Traversal Attack
Directory Traversal Attack
Suggested answer: B
asked 18/09/2024
NSANG Cyril
44 questions

Question 9

Report Export Collapse

Identify the type of attack depicted in the figure below:

ECCouncil 312-96 image Question 9 25312 09182024185534000000

SQL injection attack
SQL injection attack
Parameter/form attack
Parameter/form attack
Directory traversal attack
Directory traversal attack
Session fixation attack
Session fixation attack
Suggested answer: D
asked 18/09/2024
Suraj Porwal
41 questions

Question 10

Report Export Collapse

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

ECCouncil 312-96 image Question 10 25313 09182024185534000000

He is trying to use Whitelisting Input Validation
He is trying to use Whitelisting Input Validation
He is trying to use Non-parametrized SQL query
He is trying to use Non-parametrized SQL query
He is trying to use Blacklisting Input Validation
He is trying to use Blacklisting Input Validation
He is trying to use Parametrized SQL Query
He is trying to use Parametrized SQL Query
Suggested answer: B
asked 18/09/2024
Glen Makhuvele
40 questions
Total 47 questions
Go to page: of 5
Search

Related questions