Question 6 of 49In which phase of secure development lifecycle the threat modeling is performed?
Correct Answer: D
Question 7 of 49Identify the type of attack depicted in the figure below:
Correct Answer: B
Question 8 of 49Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp < form Id="form1" method="post" action="SearchProperty.jsp" > < input type="text" id=''txt_Search" name="txt_Search" placeholder="Search Property..." / > < input type="Submit" Id="Btn_Search" value="Search" / > < /form > However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?
Correct Answer: A
Question 9 of 49Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities. Which type of security assessment activity Jacob is currently performing?
Correct Answer: D
Question 10 of 49Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?