Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.

Alice, a Server Administrator (Tomcat), wants to ensure that Tomcat can be shut down only by the user who owns the Tomcat process. Select the appropriate setting of the CATALINA_HOME/conf in server.xml that will enable him to do so.A . < server port="" shutdown-"' > B. < server port="-1" shutdown-*"...

August 24, 2023 No Comments READ MORE +

Which line of the following example of Java Code can make application vulnerable to a session attack?

Which line of the following example of Java Code can make application vulnerable to a session attack? A . Line No. 1 B. Line No. 3 C. Line No. 4 D. Line No. 5View AnswerAnswer: B

August 21, 2023 No Comments READ MORE +

In which phase of secure development lifecycle the threat modeling is performed?

In which phase of secure development lifecycle the threat modeling is performed?A . Coding phase B. Testing phase C. Deployment phase D. Design phaseView AnswerAnswer: D

August 21, 2023 No Comments READ MORE +

Identify the type of attack depicted in the following figure.

Identify the type of attack depicted in the following figure. A . SQL Injection Attacks B. Session Fixation Attack C. Parameter Tampering Attack D. Denial-of-Service AttackView AnswerAnswer: C

August 20, 2023 No Comments READ MORE +

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:

According to secure logging practices, programmers should ensure that logging processes are not disrupted by:A . Catching incorrect exceptions B. Multiple catching of incorrect exceptions C. Re-throwing incorrect exceptions D. Throwing incorrect exceptionsView AnswerAnswer: D

August 17, 2023 No Comments READ MORE +

Identify the security mistakes that the developer has coded?

Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Java. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?A . He is...

August 16, 2023 No Comments READ MORE +

Which of the following method will help you check if DEBUG level is enabled?

Which of the following method will help you check if DEBUG level is enabled?A . isDebugEnabled() B. EnableDebug () C. IsEnableDebug () D. DebugEnabled()View AnswerAnswer: A

August 15, 2023 No Comments READ MORE +

Identify the type of attack depicted in the figure below:

Identify the type of attack depicted in the figure below: A . XSS B. Cross-Site Request Forgery (CSRF) attack C. SQL injection attack D. Denial-of-Service attackView AnswerAnswer: B

August 15, 2023 No Comments READ MORE +

Which of the threat classification model is used to classify threats during threat modeling process?

Which of the threat classification model is used to classify threats during threat modeling process?A . RED B. STRIDE C. DREAD D. SMARTView AnswerAnswer: B

August 9, 2023 No Comments READ MORE +

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?

Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?A . < connector lsSSLEnabled="Yes" / > B. < connector EnableSSL="true" / > C. < connector SSLEnabled="false" / > D. < connector SSLEnabled="true" / >View AnswerAnswer: D

August 9, 2023 No Comments READ MORE +