Certified Application Security Engineer JAVA Quiz Questions and Answers

Cost of Fixing vulnerabilities will be highest at which phase of SDLC?

Answer :
  • Deployment

_____ blocks must be used to clean up code such as releasing resources, closing inpt I/O streams and deleting files.

Answer :
  • Finally

A successful application level attack may result into:

Answer :
  • All of the these

An application is said to be secure when it secures ______.

Answer :
  • All of the above

Port ___ and ___ are generally open on perimeter for legitimate web traffic.

Answer :
  • 80, 443

SQL injection attacks use a ___________ to directly manipulate the database.

Answer :
  • Series of malicious SQL queries

Directory traversal allows attackers to _________________ including appliaction source code, configuaration, and critical system files and execute commands outside the webserver's root directory.

Answer :
  • Access restricted directories

An application is said to be secure when it ensures __ of its restricted resources.

Answer :
  • Confidentiality, integrity and availability

Which of the following is not part of SDLC?

Answer :
  • Sales

______may provide path to the attackers to perform injection attacks such as XSS attack, SQL injection attack, etc.

Answer :
  • Improper Input Validation