ECCouncil 312-96 Practice Test - Questions Answers, Page 2

List of questions
Question 11

The developer wants to remove the HttpSessionobject and its values from the client' system.
Which of the following method should he use for the above purpose?
Question 12

Identify the type of encryption depicted in the following figure.
Question 13

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Jav
Question 14

Identify the type of attack depicted in the following figure.
Question 15

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:
Question 16

Which of the threat classification model is used to classify threats during threat modeling process?
Question 17

Which line of the following example of Java Code can make application vulnerable to a session attack?
Question 18

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.
Question 19

Which of the following method will help you check if DEBUG level is enabled?
Question 20

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?
Question