312-96 Exam Question 1

To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?
  • 312-96 Exam Question 2

    Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.
    Which type of security assessment activity Jacob is currently performing?
  • 312-96 Exam Question 3

    Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?
  • 312-96 Exam Question 4

    A US-based ecommerce company has developed their website www.ec-sell.com to sell their products online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to
  • 312-96 Exam Question 5

    Which of the following relationship is used to describe security use case scenario?