ExamGecko
Home Home / ECCouncil / 312-96

ECCouncil 312-96 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











The developer wants to remove the HttpSessionobject and its values from the client' system.

Which of the following method should he use for the above purpose?

A.
sessionlnvalidateil
A.
sessionlnvalidateil
Answers
B.
Invalidate(session JSESSIONID)
B.
Invalidate(session JSESSIONID)
Answers
C.
isValidateQ
C.
isValidateQ
Answers
D.
invalidateQ
D.
invalidateQ
Answers
Suggested answer: D

Identify the type of encryption depicted in the following figure.

A.
Asymmetric Encryption
A.
Asymmetric Encryption
Answers
B.
Digital Signature
B.
Digital Signature
Answers
C.
Symmetric Encryption
C.
Symmetric Encryption
Answers
D.
Hashing
D.
Hashing
Answers
Suggested answer: C

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Jav

A.
He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?
A.
He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?
Answers
B.
He is attempting to use client-side validation
B.
He is attempting to use client-side validation
Answers
C.
He is attempting to use whitelist input validation approach
C.
He is attempting to use whitelist input validation approach
Answers
D.
He is attempting to use regular expression for validation
D.
He is attempting to use regular expression for validation
Answers
E.
He is attempting to use blacklist input validation approach
E.
He is attempting to use blacklist input validation approach
Answers
Suggested answer: D

Identify the type of attack depicted in the following figure.

A.
SQL Injection Attacks
A.
SQL Injection Attacks
Answers
B.
Session Fixation Attack
B.
Session Fixation Attack
Answers
C.
Parameter Tampering Attack
C.
Parameter Tampering Attack
Answers
D.
Denial-of-Service Attack
D.
Denial-of-Service Attack
Answers
Suggested answer: C

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:

A.
Catching incorrect exceptions
A.
Catching incorrect exceptions
Answers
B.
Multiple catching of incorrect exceptions
B.
Multiple catching of incorrect exceptions
Answers
C.
Re-throwing incorrect exceptions
C.
Re-throwing incorrect exceptions
Answers
D.
Throwing incorrect exceptions
D.
Throwing incorrect exceptions
Answers
Suggested answer: D

Which of the threat classification model is used to classify threats during threat modeling process?

A.
RED
A.
RED
Answers
B.
STRIDE
B.
STRIDE
Answers
C.
DREAD
C.
DREAD
Answers
D.
SMART
D.
SMART
Answers
Suggested answer: B

Which line of the following example of Java Code can make application vulnerable to a session attack?

A.
Line No. 1
A.
Line No. 1
Answers
B.
Line No. 3
B.
Line No. 3
Answers
C.
Line No. 4
C.
Line No. 4
Answers
D.
Line No. 5
D.
Line No. 5
Answers
Suggested answer: B

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

A.
< server port='' shutdown-'' >
A.
< server port='' shutdown-'' >
Answers
B.
< server port='-1' shutdown-*' >
B.
< server port='-1' shutdown-*' >
Answers
C.
< server port='-1' shutdown='SHUTDOWN' >
C.
< server port='-1' shutdown='SHUTDOWN' >
Answers
D.
< server port='8080' shutdown='SHUTDOWN' >
D.
< server port='8080' shutdown='SHUTDOWN' >
Answers
Suggested answer: B

Which of the following method will help you check if DEBUG level is enabled?

A.
isDebugEnabled()
A.
isDebugEnabled()
Answers
B.
EnableDebug ()
B.
EnableDebug ()
Answers
C.
IsEnableDebug ()
C.
IsEnableDebug ()
Answers
D.
DebugEnabled()
D.
DebugEnabled()
Answers
Suggested answer: A

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?

A.
< connector lsSSLEnabled='Yes' / >
A.
< connector lsSSLEnabled='Yes' / >
Answers
B.
< connector EnableSSL='true' / >
B.
< connector EnableSSL='true' / >
Answers
C.
< connector SSLEnabled='false' / >
C.
< connector SSLEnabled='false' / >
Answers
D.
< connector SSLEnabled='true' / >
D.
< connector SSLEnabled='true' / >
Answers
Suggested answer: D
Total 47 questions
Go to page: of 5