ExamGecko
Home / ECCouncil / 312-96 / List of questions
Ask Question

ECCouncil 312-96 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

In which phase of secure development lifecycle the threat modeling is performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 22

Report Export Collapse

Identify the type of attack depicted in the figure below:

ECCouncil 312-96 image Question 22 25325 09182024185534000000

Become a Premium Member for full access
  Unlock Premium Member

Question 23

Report Export Collapse

Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp

< form Id='form1' method='post' action='SearchProperty.jsp' >

< input type='text' id=''txt_Search' name='txt_Search' placeholder='Search Property...' / >

< input type='Submit' Id='Btn_Search' value='Search' / >

< /form >

However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?

Become a Premium Member for full access
  Unlock Premium Member

Question 24

Report Export Collapse

Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.

Which type of security assessment activity Jacob is currently performing?

Become a Premium Member for full access
  Unlock Premium Member

Question 25

Report Export Collapse

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 26

Report Export Collapse

Which of the following relationship is used to describe security use case scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 27

Report Export Collapse

Identify the formula for calculating the risk during threat modeling.

Become a Premium Member for full access
  Unlock Premium Member

Question 28

Report Export Collapse

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

Become a Premium Member for full access
  Unlock Premium Member

Question 29

Report Export Collapse

Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

Become a Premium Member for full access
  Unlock Premium Member

Question 30

Report Export Collapse

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

Become a Premium Member for full access
  Unlock Premium Member
Total 47 questions
Go to page: of 5
Search

Related questions