Identify what should NOT be catched while handling exceptions. A EOFExceptionB. SecurityExceptionC. IllegalAccessExceptionD. NullPointerException
The developer wants to remove the HttpSessionobject and its values from the client' system. Which of the following method should he use for the above purpose?
Alice, a security engineer, was performing security testing on the application. He found that users can view the website structure and file names. As per the standard security practices, this can pose a serious security risk as attackers can access hidden script files in your directory. Which of the following will mitigate the above security risk?
Which of the following relationship is used to describe abuse case scenarios?
Suppose there is a productList.jsp page, which displays the list of products from the database for the requested product category. The product category comes as a request parameter value. Which of the following line of code will you use to strictly validate request parameter value before processing it for execution?
Which of the following state management method works only for a sequence of dynamically generated forms?
Which of the following can be derived from abuse cases to elicit security requirements for software system?
Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?
Which of the following configurations can help you avoid displaying server names in server response header?
A US-based ecommerce company has developed their website www.ec-sell.com to sell theirproducts online. The website has a feature that allows their customer to search products based on the price. Recently, a bug bounty has discovered a security flaw in the Search page of the website, where he could see all products from the database table when he altered the website URL http://www.ec-sell.com/products.jsp?val=100 to http://www.ec-sell.com/products.jsp?val=200 OR '1'='1 -. The product.jsp page is vulnerable to