EC-Council 312-96 Questions & Answers

Full Version: 67 Q&A


Latest 312-96 Exam Questions and Practice Tests 2025 - Killexams.com


312-96 Dumps

312-96 Braindumps

312-96 Real Questions

312-96 Practice Test

312-96 Actual Questions


killexams.com EC-COUNCIL 312-96


Certified Application Security Engineer (C|ASE Java) Certification


https://killexams.com/pass4sure/exam-detail/312-96

Question: 56


Which of the following is a secure coding practice to prevent Remote Code Execution vulnerabilities?


  1. Allowing user-supplied input to be executed without proper validation

  2. Disabling input validation for code execution

  3. Implementing input validation and sanitization for code execution

  4. Using weak or common passwords


Answer: C


Explanation: Implementing input validation and sanitization for code execution is a secure coding practice to prevent Remote Code Execution vulnerabilities. By validating and sanitizing user-supplied input before executing it as code, the risk of malicious code execution can be mitigated. Allowing user-supplied input to be executed without proper validation, disabling input validation for code execution, and using weak or common passwords are insecure practices that can contribute to Remote Code Execution vulnerabilities.


Question: 57


Which of the following is a secure coding practice to prevent Security Vulnerabilities in third-party libraries?


  1. Using outdated and unpatched libraries

  2. Disabling input validation for libraries

  3. Storing sensitive data in plain text in the libraries

  4. Implementing regular updates and patching for libraries


Answer: D


Explanation: Implementing regular updates and patching for libraries is a secure coding practice to prevent Security Vulnerabilities in third-party libraries. By keeping libraries up to date and applying patches promptly, the application can address known vulnerabilities and reduce the risk of exploitation. Using outdated and unpatched libraries, disabling input validation for libraries, and storing sensitive data in plain text in the libraries are insecure practices that can contribute to security vulnerabilities.

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot.



Identify the security mistakes that the developer has coded?


  1. He is attempting to use client-side validation

  2. He is attempting to use whitelist input validation approach

  3. He is attempting to use regular expression for validation

  4. He is attempting to use blacklist input validation approach


Answer: D Question: 59

Identify the type of attack depicted in the following figure.


  1. SQL Injection Attacks

  2. Session Fixation Attack

  3. Parameter Tampering Attack

  4. Denial-of-Service Attack


Answer: C Question: 60

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:


  1. Catching incorrect exceptions

  2. Multiple catching of incorrect exceptions

  3. Re-throwing incorrect exceptions

  4. Throwing incorrect exceptions


Answer: D Question: 61

Which of the threat classification model is used to classify threats during threat modeling process?


  1. RED

  2. STRIDE

  3. DREAD

  4. SMART


Answer: B

Which line of the following example of Java Code can make application vulnerable to a session attack?



  1. Line No. 1

  2. Line No. 3

  3. Line No. 4

  4. Line No. 5


Answer: B Question: 63

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.


  1. < server port="" shutdown-"' >

  2. < server port="-1" shutdown-*" >

  3. < server port="-1" shutdown="SHUTDOWN" >

  4. < server port="8080" shutdown="SHUTDOWN" >


Answer: B Question: 64

Which of the following method will help you check if DEBUG level is enabled?


  1. isDebugEnabled()

  2. EnableDebug ()

  3. IsEnableDebug ()

  4. DebugEnabled()


Answer: A Question: 65


In which phase of secure development lifecycle the threat modeling is performed?


  1. Coding phase

  2. Testing phase

  3. Deployment phase

  4. Design phase


Answer: D Question: 67

Identify the type of attack depicted in the figure below:



  1. XSS

  2. Cross-Site Request Forgery (CSRF) attack

  3. SQL injection attack

  4. Denial-of-Service attack


Answer: B


User: Tasher*****

Passing the 312-96 exam was quite tough for me until I came across Killexams. Some of the topics were regarded as very tough to me, and I attempted to study from books, but failed as time was too short. In the end, the practice tests helped me understand the topics and wrap up my guidance in just 10 days. Killexams, you were an excellent guide, and my heartfelt thanks to you.
User: Ludmilla*****

Before using Killexams.com, I had never used a practice test for my exam preparation. However, their flexible material proved to be very effective for me, and I passed my 312-96 exam with flying colors. I was an uncommon candidate, but Killexams.com helped me become successful. I only used Killexams.com for my preparation and will continue to use their products for future exams. I scored 98% on the exam.
User: Benjamin*****

I spent enough time studying the material and passed the CERTIFIED APPLICATION SECURITY ENGINEER (C|ASE JAVA) CERTIFICATION exam with good marks. Although these materials are based on the actual exam content, I do not understand people who complain about the CERTIFIED APPLICATION SECURITY ENGINEER (C|ASE JAVA) CERTIFICATION questions being different. Although not all questions were identical to the exam, the topics and general approach were correct. So, if you study hard enough, you will do just fine.
User: Catalina*****

I am proud to say that I passed my certified application security engineer (c|ase java) certification certification with flying colors, thanks to the support provided by Killexams.com. This achievement has made me a certified certified application security engineer (c|ase java) certification professional, and I am grateful for the assistance received.
User: Taya*****

During my 312-96 coaching, I did not want to disturb my father by asking him for help with some components. I was recommended Killexams.com by one of my cousins, and it turned out to be a brilliant decision for me. Their material was very useful and beneficial for my 312-96 exam training, and I owe my excellent marks to their dedication.

Features of iPass4sure 312-96 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

All EC-Council Exams

EC-Council Exams

Certification and Entry Test Exams

Complete exam list