Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

312-96 Sample Questions Answers

Questions 4

A developer to handle global exception should use _________ annotation along with @ExceptionHandler method annotation for any class

Options:

A.

@Advice

B.

@ControllerAdvice

C.

@globalControllerAdvice

D.

@GlobalAdvice

Buy Now
Questions 5

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

Options:

A.

He is trying to use Whitelisting Input Validation

B.

He is trying to use Non-parametrized SQL query

C.

He is trying to use Blacklisting Input Validation

D.

He is trying to use Parametrized SQL Query

Buy Now
Questions 6

Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

Options:

A.

Ted was depicting abuse cases

B.

Ted was depicting abstract use cases

C.

Ted was depicting lower-level use cases

D.

Ted was depicting security use cases

Buy Now
Questions 7

Which of the following can be derived from abuse cases to elicit security requirements for software system?

Options:

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Buy Now
Questions 8

In which phase of secure development lifecycle the threat modeling is performed?

Options:

A.

Coding phase

B.

Testing phase

C.

Deployment phase

D.

Design phase

Buy Now
Questions 9

Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp

< form Id="form1" method="post" action="SearchProperty.jsp" >

< input type="text" id=''txt_Search" name="txt_Search" placeholder="Search Property..." / >

< input type="Submit" Id="Btn_Search" value="Search" / >

< /form >

However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?

Options:

A.

He should write code like out-Write ("You Searched for:" +ESAPI.encoder().encodeForHTML(search));

B.

He should write code like out.write ("You Searched for:" + request.qetParameter("search"l.toStrinq(ll;

C.

He should write code like out.write ("You Searched for:" + request.qetParameterf'txt Search"));

D.

He should write code like out.write (("You Searched for:" +(search));

Buy Now
Questions 10

A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?

Options:

A.

Maintained session by creating a Session variable user with value stored in uname variable.

B.

Maintained session by creating a HTTP variable user with value stored in uname variable.

C.

Maintained session by creating a Cookie user with value stored in uname variable.

D.

Maintained session by creating a hidden variable user with value stored in uname variable.

Buy Now
Questions 11

Identify the formula for calculating the risk during threat modeling.

Options:

A.

RISK = PROBABILITY "Attack

B.

RISK = PROBABILITY " ASSETS

C.

RISK = PROBABILITY * DAMAGE POTENTIAL

D.

IRISK = PROBABILITY * VULNERABILITY

Buy Now
Questions 12

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?

Options:

A.

He is attempting to use client-side validation

B.

He is attempting to use whitelist input validation approach

C.

He is attempting to use regular expression for validation

D.

He is attempting to use blacklist input validation approach

Buy Now
Questions 13

Which of the following configurations can help you avoid displaying server names in server response header?

Options:

A.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort= "8443" / >

B.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName=" disable" redirectPort="8443" / >

C.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" Server = " " redirectPort="8443" / >

D.

< Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName ="null " redirectPort="8443'' / >

Buy Now
Questions 14

Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?

Options:

A.

He wants to transfer the entire data over encrypted channel

B.

He wants to transfer only response parameter data over encrypted channel

C.

He wants to transfer only request parameter data over encrypted channel

D.

He wants to transfer only Session cookies over encrypted channel

Buy Now
Exam Code: 312-96
Exam Name: Certified Application Security Engineer (CASE) JAVA
Last Update: Mar 31, 2025
Questions: 47
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 312-96