New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:

A.

Catching incorrect exceptions

B.

Multiple catching of incorrect exceptions

C.

Re-throwing incorrect exceptions

D.

Throwing incorrect exceptions

Full Access
Question # 5

Which of the following is used to mapCustom Exceptions to Statuscode?

A.

@ResponseStatus

B.

@ResponseStatusCode

C.

@ResponseCode

D.

@ScacusCode

Full Access
Question # 6

In which phase of secure development lifecycle the threat modeling is performed?

A.

Coding phase

B.

Testing phase

C.

Deployment phase

D.

Design phase

Full Access
Question # 7

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?

A.

He is attempting to use client-side validation

B.

He is attempting to use whitelist input validation approach

C.

He is attempting to use regular expression for validation

D.

He is attempting to use blacklist input validation approach

Full Access
Question # 8

Which of the following method will help you check if DEBUG level is enabled?

A.

isDebugEnabled()

B.

EnableDebug ()

C.

IsEnableDebug ()

D.

DebugEnabled()

Full Access
Question # 9

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

A.

< int-param > < param-name>directory-listinqs < param-value>true < /init-param >

B.

< int param > < param-name>directorv-listinqs < param-value>false < /init-param >

C.

< int-param > < param-name>listinqs < param-value>true < /init-param

D.

< int-param > < param-name>listinqs < param-value>false < /init-param >

Full Access
Question # 10

Which of the following state management method works only for a sequence of dynamically generated forms?

A.

Cookies

B.

Sessions

C.

Hidden Field

D.

URL-rewriting

Full Access
Question # 11

Suppose there is a productList.jsp page, which displays the list of products from the database for the requested product category. The product category comes as a request parameter value. Which of the following line of code will you use to strictly validate request parameter value before processing it for execution?

A.

public boolean validateUserName() {String CategoryId= request.getParameter("CatId");}

B.

public boolean validateUserName() { Pattern p = Pattern.compile("[a-zA-Z0-9]*$"); Matcher m = p.matcher(request.getParameter(CatId")); boolean result = m.matches(); return result;}

C.

public boolean validateUserName() { if(request.getParameter("CatId")!=null ) String CategoryId=request.getParameter("CatId");}

D.

public.boolean validateUserName() { if(!request.getParamcter("CatId").equals("null"))}

Full Access
Question # 12

Identify the formula for calculating the risk during threat modeling.

A.

RISK = PROBABILITY "Attack

B.

RISK = PROBABILITY " ASSETS

C.

RISK = PROBABILITY * DAMAGE POTENTIAL

D.

IRISK = PROBABILITY * VULNERABILITY

Full Access
Question # 13

Identify what should NOT be catched while handling exceptions.

A.

EOFException

B.

SecurityException

C.

IllegalAccessException

D.

NullPointerException

Full Access
Question # 14

It is recommended that you should not use return, break, continue or throw statements in _________

A.

Finally block

B.

Try-With-Resources block

C.

Try block

D.

Catch block

Full Access