Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

312-96 Certified Application Security Engineer (CASE) JAVA Questions and Answers

Questions 4

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

Options:

A.

Attack Surface Evaluation

B.

Threat Classification

C.

Threat Identification

D.

Impact Analysis

Buy Now
Questions 5

A developer to handle global exception should use _________ annotation along with @ExceptionHandler method annotation for any class

Options:

A.

@Advice

B.

@ControllerAdvice

C.

@globalControllerAdvice

D.

@GlobalAdvice

Buy Now
Questions 6

Identify the type of encryption depicted in the following figure.

Options:

A.

Asymmetric Encryption

B.

Digital Signature

C.

Symmetric Encryption

D.

Hashing

Buy Now
Questions 7

Which of the following configuration settings in server.xml will allow Tomcat server administrator to impose limit on uploading file based on their size?

Options:

A.

< connector... maxFileLimit="file size" / >

B.

< connector... maxPostSize="0"/>

C.

< connector... maxFileSize="file size" / >

D.

< connector... maxPostSize="file size" / >

Buy Now
Questions 8

Which of the threat classification model is used to classify threats during threat modeling process?

Options:

A.

RED

B.

STRIDE

C.

DREAD

D.

SMART

Buy Now
Questions 9

Identify what should NOT be catched while handling exceptions.

Options:

A.

EOFException

B.

SecurityException

C.

IllegalAccessException

D.

NullPointerException

Buy Now
Questions 10

Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

Options:

A.

Ted was depicting abuse cases

B.

Ted was depicting abstract use cases

C.

Ted was depicting lower-level use cases

D.

Ted was depicting security use cases

Buy Now
Questions 11

Which of the following state management method works only for a sequence of dynamically generated forms?

Options:

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Buy Now
Questions 12

Which line of the following example of Java Code can make application vulnerable to a session attack?

Options:

A.

Line No. 1

B.

Line No. 3

C.

Line No. 4

D.

Line No. 5

Buy Now
Questions 13

A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?

Options:

A.

Maintained session by creating a Session variable user with value stored in uname variable.

B.

Maintained session by creating a HTTP variable user with value stored in uname variable.

C.

Maintained session by creating a Cookie user with value stored in uname variable.

D.

Maintained session by creating a hidden variable user with value stored in uname variable.

Buy Now
Questions 14

Which of the following DFD component is used to represent the change in privilege levels?

Options:

A.

3

B.

4

C.

1

D.

2

Buy Now
Exam Code: 312-96
Exam Name: Certified Application Security Engineer (CASE) JAVA
Last Update: Dec 3, 2024
Questions: 47
312-96 pdf

312-96 PDF

$29.75  $84.99
312-96 Engine

312-96 Testing Engine

$35  $99.99
312-96 PDF + Engine

312-96 PDF + Testing Engine

$47.25  $134.99