ExamGecko
Home Home / ECCouncil / 312-96

ECCouncil 312-96 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Identify what should NOT be catched while handling exceptions.


A.
SecurityException
A.
SecurityException
Answers
B.
IllegalAccessException
B.
IllegalAccessException
Answers
C.
NullPointerException
C.
NullPointerException
Answers
D.
EOFException
D.
EOFException
Answers
Suggested answer: A

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

A.
ex.StackTrace.getError();
A.
ex.StackTrace.getError();
Answers
B.
ex.message();
B.
ex.message();
Answers
C.
ex.getMessage();
C.
ex.getMessage();
Answers
D.
ex.getError();
D.
ex.getError();
Answers
Suggested answer: C

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

A.
He wants to transfer the entire data over encrypted channel
A.
He wants to transfer the entire data over encrypted channel
Answers
B.
He wants to transfer only response parameter data over encrypted channel
B.
He wants to transfer only response parameter data over encrypted channel
Answers
C.
He wants to transfer only request parameter data over encrypted channel
C.
He wants to transfer only request parameter data over encrypted channel
Answers
D.
He wants to transfer only Session cookies over encrypted channel
D.
He wants to transfer only Session cookies over encrypted channel
Answers
Suggested answer: A

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter('filename');

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath('/');

String PathVariable = '';

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

A.
URL Tampering vulnerability
A.
URL Tampering vulnerability
Answers
B.
Form Tampering vulnerability
B.
Form Tampering vulnerability
Answers
C.
XSS vulnerability
C.
XSS vulnerability
Answers
D.
Directory Traversal vulnerability
D.
Directory Traversal vulnerability
Answers
Suggested answer: D

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

A.
Failure to Restrict URL
A.
Failure to Restrict URL
Answers
B.
Broken Authentication
B.
Broken Authentication
Answers
C.
Unvalidated Redirects and Forwards
C.
Unvalidated Redirects and Forwards
Answers
D.
Denial-of-Service [Do
D.
Denial-of-Service [Do
Answers
Suggested answer: D

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

A.
DREAD
A.
DREAD
Answers
B.
SMART
B.
SMART
Answers
C.
STRIDE
C.
STRIDE
Answers
D.
RED
D.
RED
Answers
Suggested answer: C

Which of the following Spring Security Framework configuration setting will ensure the protection from session fixation attacks by not allowing authenticated user to login again?

A.
session-fixation-protection ='newSessionlD'
A.
session-fixation-protection ='newSessionlD'
Answers
B.
session-fixation-protection ='.
B.
session-fixation-protection ='.
Answers
C.
session-fixation-protection ='enabled'
C.
session-fixation-protection ='enabled'
Answers
D.
session-fixation-protection ='.
D.
session-fixation-protection ='.
Answers
Suggested answer: B

Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of the consequences of insecure coding. One day, he wrote code as shown in the following screenshot. He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.

A.
Denial-of-Service attack
A.
Denial-of-Service attack
Answers
B.
Client-Side Scripts Attack
B.
Client-Side Scripts Attack
Answers
C.
SQL Injection Attack
C.
SQL Injection Attack
Answers
D.
Directory Traversal Attack
D.
Directory Traversal Attack
Answers
Suggested answer: B

Identify the type of attack depicted in the figure below:

A.
SQL injection attack
A.
SQL injection attack
Answers
B.
Parameter/form attack
B.
Parameter/form attack
Answers
C.
Directory traversal attack
C.
Directory traversal attack
Answers
D.
Session fixation attack
D.
Session fixation attack
Answers
Suggested answer: D

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

A.
He is trying to use Whitelisting Input Validation
A.
He is trying to use Whitelisting Input Validation
Answers
B.
He is trying to use Non-parametrized SQL query
B.
He is trying to use Non-parametrized SQL query
Answers
C.
He is trying to use Blacklisting Input Validation
C.
He is trying to use Blacklisting Input Validation
Answers
D.
He is trying to use Parametrized SQL Query
D.
He is trying to use Parametrized SQL Query
Answers
Suggested answer: B
Total 47 questions
Go to page: of 5