EC-Council CASE Java (312-96) Certification Sample Questions

CASE Java Dumps, 312-96 Dumps, 312-96 PDF, CASE Java VCE, EC-Council 312-96 VCE, EC-Council Application Security Engineer Java PDFThe purpose of this Sample Question Set is to provide you with information about the EC-Council Application Security Engineer - Java exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 312-96 certification test. To get familiar with real exam environment, we suggest you try our Sample EC-Council CASE Java Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual EC-Council Certified Application Security Engineer (CASE) - Java certification exam.

These sample questions are simple and basic questions that represent likeness to the real EC-Council 312-96 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium EC-Council CASE Java Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

EC-Council 312-96 Sample Questions:

01. A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?
a) Maintained session by creating a hidden variable user with value stored in uname variable.
b) Maintained session by creating a Cookie user with value stored in uname variable.
c) Maintained session by creating a Session variable user with value stored in uname variable.
d) Maintained session by creating a HTTP variable user with value stored in uname variable.
 
02. The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________
a) Attack Surface Evaluation
b) Threat Classification
c) Identification
d) Analysis
 
03. Which of the following can be derived from abuse cases to elicit security requirements for software system?
a) Data flow diagram
b) Misuse cases
c) Use cases
d) Security use cases
 
04. Which of the following is used to mapCustom Exceptions to Statuscode?
a) @ResponseStatus
b) @ResponseStatusCode
c) @ResponseCode
d) @ScacusCode
 
05. Which of the following relationship is used to describe abuse case scenarios?
a) Include Relationship
b) Threatens Relationship
c) Extend Relationship
d) Mitigates Relationship
 
06. Suppose there is a productList.jsp page, which displays the list of products from the database for the requested product category. The product category comes as a request parameter value. Which of the following line of code will you use to strictly validate request parameter value before processing it for execution?
a) public boolean validateUserName() { Pattern p = Pattern.compile('[a-zA-Z0-9]*$'); Matcher m = p.matcher(request.getParameter(CatId')); boolean result = m.matches(); return result;}
b) public boolean validateUserName() {String CategoryId= request.getParameter('CatId');}
c) public boolean validateUserName() { if(request.getParameter('CatId')!=null ) String CategoryId=request.getParameter('CatId');}
d) public.boolean validateUserName() { if(!request.getParamcter('CatId').equals('null'))}
 
07. The developer wants to remove the HttpSessionobject and its values from the client' system. Which of the following method should he use for the above purpose?
a) sessionInvalidate()
b) Invalidate(session JSESSIONID)
c) isValidate()
d) invalidate()
 
08. Which of the following configurations can help you avoid displaying server names in server response header?
a) < Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort= "8443" / >
b) < Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName=" disable" redirectPort="8443" / >
c) < Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" Server = " " redirectPort="8443" / >
d) < Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" ServerName ="null " redirectPort="8443'' / >
 
09. Which of the following method will you use in place of ex.printStackTrace() method to avoid printing stack trace on error?
a) ex.StackTrace.getError();
b) ex.message();
c) ex.getError();
d) ex.getMessage();
 
10. Which of the following state management method works only for a sequence of dynamically generated forms?
a) Cookies
b) Sessions
c) Hidden Field
d) URL-rewriting

Answers:

Question: 01
Answer: c
Question: 02
Answer: a
Question: 03
Answer: b
Question: 04
Answer: a
Question: 05
Answer: b
Question: 06
Answer: a
Question: 07
Answer: d
Question: 08
Answer: c
Question: 09
Answer: d
Question: 10
Answer: c

Note: For any error in EC-Council Certified Application Security Engineer (CASE) - Java (312-96) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.9 / 5 (76 votes)