Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 312-96 Practice Exam with Questions & Answers

Questions 1

James is a Java developer working INFR INC. He has written Java code to open a file, read it line by line and display its content in the text editor. He wants to ensure that any unhandled exception raised by the code should automatically close the opened file stream. Which of the following exception handling block should he use for the above purpose?

Options:
A.

Try-Catch-Finally block

B.

Try-Catch block

C.

Try-With-Resources block

D.

Try-Catch-Resources block

ECCouncil 312-96 Premium Access
Questions 2

Which of the following Spring Security Framework configuration setting will ensure the protection from session fixation attacks by not allowing authenticated user to login again?

Options:
A.

session-fixation-protection ="newSessionlD"

B.

session-fixation-protection =".

C.

session-fixation-protection ="enabled"

D.

session-fixation-protection =".

Questions 3

Alice works as a Java developer in Fygo software Services Ltd. He is given the responsibility to design a bookstore website for one of their clients. This website is supposed to store articles in .pdf format. Alice is advised by his superior to design ArticlesList.jsp page in such a way that it should display a list of all the articles in one page and should send a selected filename as a query string to redirect users to articledetails.jsp page.

Alice wrote the following code on page load to read the file name.

String myfilename = request.getParameter("filename");

String txtFileNameVariable = myfilename;

String locationVariable = request.getServletContext().getRealPath("/");

String PathVariable = "";

PathVariable = locationVariable + txtFileNameVariable;

BufferedInputStream bufferedInputStream = null;

Path filepath = Paths.get(PathVariable);

After reviewing this code, his superior pointed out the security mistake in the code and instructed him not repeat the same in future. Can you point the type of vulnerability that may exist in the above code?

Options:
A.

URL Tampering vulnerability

B.

Form Tampering vulnerability

C.

XSS vulnerability

D.

Directory Traversal vulnerability

Questions 4

Identify the type of attack depicted in the following figure.

312-96 Question 4

Options:
A.

SQL Injection Attacks

B.

Session Fixation Attack

C.

Parameter Tampering Attack

D.

Denial-of-Service Attack

Questions 5

A developer has written the following line of code to handle and maintain session in the application. What did he do in the below scenario?

312-96 Question 5

Options:
A.

Maintained session by creating a Session variable user with value stored in uname variable.

B.

Maintained session by creating a HTTP variable user with value stored in uname variable.

C.

Maintained session by creating a Cookie user with value stored in uname variable.

D.

Maintained session by creating a hidden variable user with value stored in uname variable.

Questions 6

Identify the type of attack depicted in the figure below:

312-96 Question 6

Options:
A.

XSS

B.

Cross-Site Request Forgery (CSRF) attack

C.

SQL injection attack

D.

Denial-of-Service attack

Questions 7

Which of the following relationship is used to describe abuse case scenarios?

Options:
A.

Include Relationship

B.

Threatens Relationship

C.

Extend Relationship

D.

Mitigates Relationship

Questions 8

A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to

Options:
A.

Session Hijacking attack

B.

Cross Site Request Forgery attack

C.

SQL Injection attack

D.

Brute force attack

Questions 9

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

Options:
A.

< server port="" shutdown-"' >

B.

< server port="-1" shutdown-*" >

C.

< server port="-1" shutdown="SHUTDOWN" >

D.

< server port="8080" shutdown="SHUTDOWN" >

Questions 10

Which of the threat classification model is used to classify threats during threat modeling process?

Options:
A.

RED

B.

STRIDE

C.

DREAD

D.

SMART