ExamGecko
Home Home / ECCouncil / 312-96

ECCouncil 312-96 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











In which phase of secure development lifecycle the threat modeling is performed?

A.
Coding phase
A.
Coding phase
Answers
B.
Testing phase
B.
Testing phase
Answers
C.
Deployment phase
C.
Deployment phase
Answers
D.
Design phase
D.
Design phase
Answers
Suggested answer: D

Identify the type of attack depicted in the figure below:

A.
XSS
A.
XSS
Answers
B.
Cross-Site Request Forgery (CSRF) attack
B.
Cross-Site Request Forgery (CSRF) attack
Answers
C.
SQL injection attack
C.
SQL injection attack
Answers
D.
Denial-of-Service attack
D.
Denial-of-Service attack
Answers
Suggested answer: B

Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp

< form Id='form1' method='post' action='SearchProperty.jsp' >

< input type='text' id=''txt_Search' name='txt_Search' placeholder='Search Property...' / >

< input type='Submit' Id='Btn_Search' value='Search' / >

< /form >

However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?

A.
He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
A.
He should write code like out-Write ('You Searched for:' +ESAPI.encoder().encodeForHTML(search));
Answers
B.
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
B.
He should write code like out.write ('You Searched for:' + request.qetParameter('search'l.toStrinq(ll;
Answers
C.
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
C.
He should write code like out.write ('You Searched for:' + request.qetParameterf'txt Search'));
Answers
D.
He should write code like out.write (('You Searched for:' +(search));
D.
He should write code like out.write (('You Searched for:' +(search));
Answers
Suggested answer: A

Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.

Which type of security assessment activity Jacob is currently performing?

A.
ISCST
A.
ISCST
Answers
B.
CAST
B.
CAST
Answers
C.
CAST
C.
CAST
Answers
D.
SAST
D.
SAST
Answers
Suggested answer: D

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

A.
< int-param > < param-name>directory-listinqs < param-value>true < /init-param >
A.
< int-param > < param-name>directory-listinqs < param-value>true < /init-param >
Answers
B.
< int param > < param-name>directorv-listinqs < param-value>false < /init-param >
B.
< int param > < param-name>directorv-listinqs < param-value>false < /init-param >
Answers
C.
< int-param > < param-name>listinqs < param-value>true < /init-param
C.
< int-param > < param-name>listinqs < param-value>true < /init-param
Answers
D.
< int-param > < param-name>listinqs < param-value>false < /init-param >
D.
< int-param > < param-name>listinqs < param-value>false < /init-param >
Answers
Suggested answer: B

Which of the following relationship is used to describe security use case scenario?

A.
Threatens Relationship
A.
Threatens Relationship
Answers
B.
Extend Relationship
B.
Extend Relationship
Answers
C.
Mitigates Relationship
C.
Mitigates Relationship
Answers
D.
Include Relationship
D.
Include Relationship
Answers
Suggested answer: B

Identify the formula for calculating the risk during threat modeling.

A.
RISK = PROBABILITY 'Attack
A.
RISK = PROBABILITY 'Attack
Answers
B.
RISK = PROBABILITY ' ASSETS
B.
RISK = PROBABILITY ' ASSETS
Answers
C.
RISK = PROBABILITY * DAMAGE POTENTIAL
C.
RISK = PROBABILITY * DAMAGE POTENTIAL
Answers
D.
IRISK = PROBABILITY * VULNERABILITY
D.
IRISK = PROBABILITY * VULNERABILITY
Answers
Suggested answer: C

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

A.
Attack Surface Evaluation
A.
Attack Surface Evaluation
Answers
B.
Threat Classification
B.
Threat Classification
Answers
C.
Threat Identification
C.
Threat Identification
Answers
D.
Impact Analysis
D.
Impact Analysis
Answers
Suggested answer: A

Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

A.
Ted was depicting abuse cases
A.
Ted was depicting abuse cases
Answers
B.
Ted was depicting abstract use cases
B.
Ted was depicting abstract use cases
Answers
C.
Ted was depicting lower-level use cases
C.
Ted was depicting lower-level use cases
Answers
D.
Ted was depicting security use cases
D.
Ted was depicting security use cases
Answers
Suggested answer: A

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

A.
Session Hijacking attack
A.
Session Hijacking attack
Answers
B.
Cross Site Request Forgery attack
B.
Cross Site Request Forgery attack
Answers
C.
SQL Injection attack
C.
SQL Injection attack
Answers
D.
Brute force attack
D.
Brute force attack
Answers
Suggested answer: C
Total 47 questions
Go to page: of 5