Carlos Veliz
Quiz von , erstellt am more than 1 year ago

Mix Test 42p

33
0
0
Carlos Veliz
Erstellt von Carlos Veliz vor mehr als 9 Jahre
Schließen

Java Mix Test 42p

Frage 1 von 42

1

Defines interfaces and classes to help in internet communications authentication:

Wähle eine der folgenden:

  • Java.security

  • Java SASL API

  • JCE

  • JAAS

  • None of the above

Erklärung

Frage 2 von 42

1

It is not part of the Java Cryptography Architecture:

Wähle eine der folgenden:

  • RSA

  • Triple DES

  • Standard Algorithms

  • Class Loader

  • Sandbox

Erklärung

Frage 3 von 42

1

Java protects the user from hostile applications that hamper security through the concept:

Wähle eine der folgenden:

  • Security Manager

  • Sandbox

  • Intermediate fikes

  • Java Complier

  • None of the above

Erklärung

Frage 4 von 42

1

Is an open source program that uses static analysis to identify hundreds of different potential types of errores in Java programs:

Wähle eine der folgenden:

  • FxCop

  • FindErrors

  • FxBugs

  • FindBugs

  • None of the above

Erklärung

Frage 5 von 42

1

It is not a functionality of FindBugs:

Wähle eine der folgenden:

  • Eliminate security mistakes found.

  • Find security mistakes.

  • Reduce development time.

  • All of the above

  • None of the above

Erklärung

Frage 6 von 42

1

Which of the following stages of the life cycle, has the lowest relative cost to fix a software defect?

Wähle eine der folgenden:

  • In service

  • Design

  • Requirements Definition

  • Customer Testing

  • Programming

Erklärung

Frage 7 von 42

1

It is a feature of a secured software:

Wähle eine der folgenden:

  • Trustworthiness

  • Modularity

  • Reliability

  • Availability

  • All of the above

Erklärung

Frage 8 von 42

1

Following questions help analyze and improve the security of a software

Wähle eine der folgenden:

  • 1) What area the various types od defects that cause security vulnerabilities?

  • 2) Which tools can be used for measuring the defects?

  • 3)How many lines to have the source code?

  • 4) 1 and 2

  • 5) 2 and 3

Erklärung

Frage 9 von 42

1

"This method helps to split the complex and large problems into smaller ones resulting in quick and effcicent problem solving rather than dealing with the whole". This concept belongs to:

Wähle eine der folgenden:

  • Abstraction

  • Decomposition

  • Design

  • Complexity

  • None of the above options

Erklärung

Frage 10 von 42

1

Threat modeling. Which of the following is not a security technique?

Wähle eine der folgenden:

  • Threat Mitigation

  • Threat trees

  • Privilege boundaries

  • Entry point identification

  • None of the above options

Erklärung

Frage 11 von 42

1

Threat modeling. Which of the following is not a correct approach?

Wähle eine der folgenden:

  • Hybrid Centric

  • Software/Design Centric

  • Attack Centric

  • Threat Centric

  • Asset Centric

Erklärung

Frage 12 von 42

1

What method is used to identify the following threats?
spoofing, tampering, DoS, information disclosure and elevation of privileges

Wähle eine der folgenden:

  • Attack Tree Structures

  • Stride

  • Information Gathering

  • ASF

  • None of the above options

Erklärung

Frage 13 von 42

1

Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle:

Wähle eine der folgenden:

  • ADSL Threat modeling

  • SDL Threat modeling

  • Analyze Model

  • Analyze and generate model

  • None of the above options

Erklärung

Frage 14 von 42

1

How will you implement secure file handling to prevent malicious file inclusion and DoS attacks?

Wähle eine der folgenden:

  • Findbugs

  • SecureFilehandling

  • FxCop

  • SecureFile

  • None of the above options

Erklärung

Frage 15 von 42

1

The SecureFilehandling application only accepts the following file extensions:

Wähle eine der folgenden:

  • .xlsx

  • .class

  • .obj

  • .exe

  • Accepts all file extensions

Erklärung

Frage 16 von 42

1

What are the types of streams in Java?

Wähle eine der folgenden:

  • Character and Byte Stream

  • Byte and Compact Stream

  • Character and Encode Stream

  • All of the above

  • None of the above options

Erklärung

Frage 17 von 42

1

It is not a proper access privileges:

Wähle eine der folgenden:

  • The owner grants permission to the users to access the content available in the systems

  • All the files are created with access permissions so that unauthorized access can be denied

  • Multi user systems are generally owned by a particular user for instance system admin etc.

  • There ara various classes in java that handle characters streams and byte streams separately

  • None of the above options

Erklärung

Frage 18 von 42

1

Which of the following instructions ensures proper File Cleanup when a program terminates?

Wähle eine der folgenden:

  • Runtime.getRuntime().exit(1);

  • exit();

  • terminate();

  • out.exit();

  • out.close();

Erklärung

Frage 19 von 42

1

"It prevents untrusted code from modifying the class internal layout". In Security Manager Checks, this concept corresponds to:

Wähle eine der folgenden:

  • Prevents extracting any data

  • Check Constructor

  • Prevents modification

  • Prevents handling

  • None of the above options

Erklärung

Frage 20 von 42

1

The project InputValidation not control one of the following statements?

Wähle eine der folgenden:

  • User login

  • User Password

  • Size password

  • User size

  • None of the above options

Erklärung

Frage 21 von 42

1

On which side it is recommended to apply input validation?

Wähle eine der folgenden:

  • client-side

  • server-side

  • both

  • None of the above

Erklärung

Frage 22 von 42

1

Which of the following types of input parameters is the most used in SQL vulnerabilities?

Wähle eine der folgenden:

  • Structured text

  • number

  • boolean

  • freetext

  • list of structured text

Erklärung

Frage 23 von 42

1

Which of the following types of input parameters is the least used in XSS vulnerabilities?

Wähle eine der folgenden:

  • List of free text

  • structured text

  • number

  • boolean

  • enumeration

Erklärung

Frage 24 von 42

1

What is the exact description of the regular expression "(a-z A-Z)(a-z A-Z 0-9_$)"?

Wähle eine der folgenden:

  • A valid java identifier consisting of alphanumeric characters, undercores and dolar signs with the first characer being an alphabet

  • A valid java identifier consisting of alphanumeric charecters and dollar signs with the first cgaracter bieng an alphabet

  • Any two-digit alphanumeric from 0-99 and a-z

  • Matches az, AZ and 9$

Erklärung

Frage 25 von 42

1

Which of the following is not a recommendation of struts validation and securitiy?

Wähle eine der folgenden:

  • The absence of validation for a single field may allow attackers to exploit the application

  • Struts validation is done to prevent attacks caused through inchecked input

  • Each and every field included in the form should be validates in the correspondig validation form

  • Input validation through Servet filters in Java web applications is effecvtive due to minor modifications needed for input validation and servlet filets are centralized in nature

  • None of the above

Erklärung

Frage 26 von 42

1

Indicate that statement does not belong to the class RuntimeException:

Wähle eine der folgenden:

  • ArrayStoreException

  • NegativeArraySizeException

  • FileNotFoundException

  • NullPointerException

  • SecurityException

Erklärung

Frage 27 von 42

1

Which of the following is an exceptional behavior erroneous?

Wähle eine der folgenden:

  • Never catch NullPointerException

  • Disclosing sensitive information

  • Never throw undeclared checked exceptions

  • Logging sensitive data

  • All of the above

Erklärung

Frage 28 von 42

1

Examples of Java Logging Frameworks:

Wähle eine der folgenden:

  • Apache Commons Logging

  • Log4J

  • Java Logging API

  • SLF4J

  • All of the above

Erklärung

Frage 29 von 42

1

Which of the following is not a Secured Practices in Logging?

Wähle eine der folgenden:

  • Log Debug messages inside isDebugEnabled()

  • Make use of good java logging frameworks like java.util.logging or log4j

  • Log messages consitently and the messages must be informative

  • Ensure to include the formar of the java loggind in the specified java logger

  • Ensure to remove temporary files before termination to avoid information leakage and resource exhaustion

Erklärung

Frage 30 von 42

1

HTTP Basic Authentication:

Wähle eine der folgenden:

  • Request a protected resource - Request username password - Sends username password - returns requested resource

  • Request username password - Sends username password - returns requested resource

  • Request username password - Request a protected resource - Sends username password - returns requested resource

  • Sends username password - Request username password - Request a protected resource - returns requested resource

  • None of the above options

Erklärung

Frage 31 von 42

1

Which of the following is not a measure of prevention for attacks weak password?

Wähle eine der folgenden:

  • Impose a password againg policy

  • Impose web application accepts only user id credentials that contain all valid characters including special characters like !, @, #, $, etc.

  • Incorrect authentication failure messages should be avoided

  • Implement account lockout policy

  • None of the above

Erklärung

Frage 32 von 42

1

Which of the following statements does not describe RBAC?

Wähle eine der folgenden:

  • It functions on the concept of user roles and information accessibility

  • This is the popular access control model

  • A user has access to resources based on the role assigned; roles are allocated depending on job function

  • The access control policies are imposed on policy, specific to the user

  • An organization has different departments, and roles are assigned based on requirements

Erklärung

Frage 33 von 42

1

Which of the following is not a feature of JAAS?

Wähle eine der folgenden:

  • Is implemented usign pure JAVA

  • Supports single sig-on for login authentication in J2EE appplications

  • Provides centralized rol based control that includes hierarchical roles

  • Is implemented usign JAVA and JavaScript

  • Authentication of users is done through PAM Framework

Erklärung

Frage 34 von 42

1

JAAS Configuration. The configurations file format consists of the following entries:

Wähle eine der folgenden:

  • LoginEntry

  • ModuleClass

  • Flag

  • Option="value"

  • All options are correct

Erklärung

Frage 35 von 42

1

In the architecture of a Java EE application. Which of the following is not a component of the Web level?

Wähle eine der folgenden:

  • Web Services Client

  • Servlet

  • App Flow Processor

  • View Manager

  • None of the above

Erklärung

Frage 36 von 42

1

Concurrency in Java. Which of the following is not a state of a thread?

Wähle eine der folgenden:

  • Suspended

  • Resumed

  • Blocked

  • Dead

  • Reset

Erklärung

Frage 37 von 42

1

In ]ava, the following methods are vulnerable to race condition:

Wähle eine der folgenden:

  • 1) start()

  • 2) stop()

  • 3) init()

  • 4) 1 and 3

  • 5) 1, 2 and 3

Erklärung

Frage 38 von 42

1

It is a countermeasure to session hijacking:

Wähle eine der folgenden:

  • See the session is not expired after users log out

  • Regularly clear the history and offline content

  • Prefer http than https in case of sensitive and confidential transactions

  • Make sure that cookies and sessions are stored from the browser

  • None of the above

Erklärung

Frage 39 von 42

1

Which of the following statements does not include the Java Criptography Arquitecture engine?

Wähle eine der folgenden:

  • Key Store

  • Key pair Generator

  • Key Tools

  • CertStore

  • Key Factories

Erklärung

Frage 40 von 42

1

javax.net and javax.net.ssl packages are the standard JSSE APIs that includes important classes such as:

Wähle eine der folgenden:

  • 1) SSLSocket

  • 2) SocketFactory

  • 3) ServerSocketFactory

  • 4) All of the above

  • 5) None of the above

Erklärung

Frage 41 von 42

1

It is not a tool Java Cryptography:

Wähle eine der folgenden:

  • JCryption

  • Optimus Java

  • PrimeInk JAva

  • jdnssec

  • Cryptix

Erklärung

Frage 42 von 42

1

Which of the following is not a countermeasure CRSF?

Wähle eine der folgenden:

  • Appropriately use GET and Post requests

  • Implement OWASP CRFGuard Library

  • Web applications should use weak authentications methods such as cookies, http authentication, etc

  • Check the referrer such as HTTP "referer"

  • None of the above

Erklärung