Questions for the 312-96 were updated on : Dec 01 ,2025
Suppose there is a productList.jsp page, which displays the list of products from the database for the
requested product category. The product category comes as a request parameter value. Which of the
following line of code will you use to strictly validate request parameter value before processing it for
execution?
B
Identify the type of encryption depicted in the following figure.
C
The developer wants to remove the HttpSessionobject and its values from the client' system.
Which of the following method should he use for the above purpose?
D
During his secure code review, John, an independent application security expert, found that the
developer has used Java code as highlighted in the following screenshot. Identify the security
mistake committed by the developer?
B
Identify the type of attack depicted in the figure below:
D
Thomas is not skilled in secure coding. He neither underwent secure coding training nor is aware of
the consequences of insecure coding. One day, he wrote code as shown in the following screenshot.
He passed 'false' parameter to setHttpOnly() method that may result in the existence of a certain
type of vulnerability. Identify the attack that could exploit the vulnerability in the above case.
B
Which of the following method will you use in place of ex.printStackTrace() method to avoid printing
stack trace on error?
C
Identify what should NOT be catched while handling exceptions.
A EOFException
B. SecurityException
C. IllegalAccessException
D. NullPointerException
B
To enable the struts validator on an application, which configuration setting should be applied in the
struts validator configuration file?
A
Which of the following relationship is used to describe abuse case scenarios?
B
It is recommended that you should not use return, break, continue or throw statements in
_________
A
Which of the following is used to mapCustom Exceptions to Statuscode?
A
Which of the following authentication mechanism does J2EE support?
D
Which of the following state management method works only for a sequence of dynamically
generated forms?
C
Which of the following can be derived from abuse cases to elicit security requirements for software
system?
D