Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil Application Security 312-96 Questions and answers with ValidTests

Exam 312-96 All Questions
Exam 312-96 Premium Access

View all detail and faqs for the 312-96 exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

Options:

A.

Attack Surface Evaluation

B.

Threat Classification

C.

Threat Identification

D.

Impact Analysis

Expert Solution
Questions # 12:

Suppose there is a productList.jsp page, which displays the list of products from the database for the requested product category. The product category comes as a request parameter value. Which of the following line of code will you use to strictly validate request parameter value before processing it for execution?

Options:

A.

public boolean validateUserName() {String CategoryId= request.getParameter("CatId");}

B.

public boolean validateUserName() { Pattern p = Pattern.compile("[a-zA-Z0-9]*$"); Matcher m = p.matcher(request.getParameter(CatId")); boolean result = m.matches(); return result;}

C.

public boolean validateUserName() { if(request.getParameter("CatId")!=null ) String CategoryId=request.getParameter("CatId");}

D.

public.boolean validateUserName() { if(!request.getParamcter("CatId").equals("null"))}

Expert Solution
Questions # 13:

Identify the formula for calculating the risk during threat modeling.

Options:

A.

RISK = PROBABILITY "Attack

B.

RISK = PROBABILITY " ASSETS

C.

RISK = PROBABILITY * DAMAGE POTENTIAL

D.

IRISK = PROBABILITY * VULNERABILITY

Expert Solution
Questions # 14:

Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?

Options:

A.

< int-param > < param-name>directory-listinqs < param-value>true < /init-param >

B.

< int param > < param-name>directorv-listinqs < param-value>false < /init-param >

C.

< int-param > < param-name>listinqs < param-value>true < /init-param

D.

< int-param > < param-name>listinqs < param-value>false < /init-param >

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions