Question 6 of 49
In which phase of secure development lifecycle the threat modeling is performed?
    Correct Answer: D

Question 7 of 49
Identify the type of attack depicted in the figure below:
Exam 312-96: Question 7 - Image 1
    Correct Answer: B

Question 8 of 49
Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp
< form Id="form1" method="post" action="SearchProperty.jsp" >
< input type="text" id=''txt_Search" name="txt_Search" placeholder="Search Property..." / >
< input type="Submit" Id="Btn_Search" value="Search" / >
< /form >
However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?
    Correct Answer: A

Question 9 of 49
Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities.
Which type of security assessment activity Jacob is currently performing?
    Correct Answer: D

Question 10 of 49
Oliver, a Server Administrator (Tomcat), has set configuration in web.xml file as shown in the following screenshot. What is he trying to achieve?
Exam 312-96: Question 10 - Image 1
    Correct Answer: A