Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Application Security Engineer (CASE) JAVA

Last Update 17 hours ago Total Questions : 47

The Certified Application Security Engineer (CASE) JAVA content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include 312-96 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 312-96 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 312-96 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Application Security Engineer (CASE) JAVA practice test comfortably within the allotted time.

Question # 1

Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

A.

DREAD

B.

SMART

C.

STRIDE

D.

RED

Question # 2

Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?

A.

ex.StackTrace.getError();

B.

ex.message();

C.

ex.getMessage();

D.

ex.getError();

Question # 3

Identify the type of attack depicted in the figure below:

A.

XSS

B.

Cross-Site Request Forgery (CSRF) attack

C.

SQL injection attack

D.

Denial-of-Service attack

Question # 4

The developer wants to remove the HttpSessionobject and its values from the client ' system.

Which of the following method should he use for the above purpose?

A.

sessionlnvalidateil

B.

Invalidate(session JSESSIONID)

C.

isValidateQ

D.

invalidateQ

Question # 5

Which of the following relationship is used to describe abuse case scenarios?

A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Question # 6

Identify the type of attack depicted in the figure below:

A.

SQL injection attack

B.

Parameter/form attack

C.

Directory traversal attack

D.

Session fixation attack

Question # 7

During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?

A.

He is trying to use Whitelisting Input Validation

B.

He is trying to use Non-parametrized SQL query

C.

He is trying to use Blacklisting Input Validation

D.

He is trying to use Parametrized SQL Query

Question # 8

In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.

A.

Failure to Restrict URL

B.

Broken Authentication

C.

Unvalidated Redirects and Forwards

D.

Denial-of-Service [Do

Question # 9

Which of the following can be derived from abuse cases to elicit security requirements for software system?

A.

Misuse cases

B.

Data flow diagram

C.

Use cases

D.

Security use cases

Question # 10

Identify the type of attack depicted in the following figure.

A.

SQL Injection Attacks

B.

Session Fixation Attack

C.

Parameter Tampering Attack

D.

Denial-of-Service Attack

Go to page: