Java Mix Test 42p

Descripción

Mix Test 42p
Carlos Veliz
Test por Carlos Veliz, actualizado hace más de 1 año
Carlos Veliz
Creado por Carlos Veliz hace casi 9 años
32
0

Resumen del Recurso

Pregunta 1

Pregunta
Defines interfaces and classes to help in internet communications authentication:
Respuesta
  • Java.security
  • Java SASL API
  • JCE
  • JAAS
  • None of the above

Pregunta 2

Pregunta
It is not part of the Java Cryptography Architecture:
Respuesta
  • RSA
  • Triple DES
  • Standard Algorithms
  • Class Loader
  • Sandbox

Pregunta 3

Pregunta
Java protects the user from hostile applications that hamper security through the concept:
Respuesta
  • Security Manager
  • Sandbox
  • Intermediate fikes
  • Java Complier
  • None of the above

Pregunta 4

Pregunta
Is an open source program that uses static analysis to identify hundreds of different potential types of errores in Java programs:
Respuesta
  • FxCop
  • FindErrors
  • FxBugs
  • FindBugs
  • None of the above

Pregunta 5

Pregunta
It is not a functionality of FindBugs:
Respuesta
  • Eliminate security mistakes found.
  • Find security mistakes.
  • Reduce development time.
  • All of the above
  • None of the above

Pregunta 6

Pregunta
Which of the following stages of the life cycle, has the lowest relative cost to fix a software defect?
Respuesta
  • In service
  • Design
  • Requirements Definition
  • Customer Testing
  • Programming

Pregunta 7

Pregunta
It is a feature of a secured software:
Respuesta
  • Trustworthiness
  • Modularity
  • Reliability
  • Availability
  • All of the above

Pregunta 8

Pregunta
Following questions help analyze and improve the security of a software
Respuesta
  • 1) What area the various types od defects that cause security vulnerabilities?
  • 2) Which tools can be used for measuring the defects?
  • 3)How many lines to have the source code?
  • 4) 1 and 2
  • 5) 2 and 3

Pregunta 9

Pregunta
"This method helps to split the complex and large problems into smaller ones resulting in quick and effcicent problem solving rather than dealing with the whole". This concept belongs to:
Respuesta
  • Abstraction
  • Decomposition
  • Design
  • Complexity
  • None of the above options

Pregunta 10

Pregunta
Threat modeling. Which of the following is not a security technique?
Respuesta
  • Threat Mitigation
  • Threat trees
  • Privilege boundaries
  • Entry point identification
  • None of the above options

Pregunta 11

Pregunta
Threat modeling. Which of the following is not a correct approach?
Respuesta
  • Hybrid Centric
  • Software/Design Centric
  • Attack Centric
  • Threat Centric
  • Asset Centric

Pregunta 12

Pregunta
What method is used to identify the following threats? spoofing, tampering, DoS, information disclosure and elevation of privileges
Respuesta
  • Attack Tree Structures
  • Stride
  • Information Gathering
  • ASF
  • None of the above options

Pregunta 13

Pregunta
Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle:
Respuesta
  • ADSL Threat modeling
  • SDL Threat modeling
  • Analyze Model
  • Analyze and generate model
  • None of the above options

Pregunta 14

Pregunta
How will you implement secure file handling to prevent malicious file inclusion and DoS attacks?
Respuesta
  • Findbugs
  • SecureFilehandling
  • FxCop
  • SecureFile
  • None of the above options

Pregunta 15

Pregunta
The SecureFilehandling application only accepts the following file extensions:
Respuesta
  • .xlsx
  • .class
  • .obj
  • .exe
  • Accepts all file extensions

Pregunta 16

Pregunta
What are the types of streams in Java?
Respuesta
  • Character and Byte Stream
  • Byte and Compact Stream
  • Character and Encode Stream
  • All of the above
  • None of the above options

Pregunta 17

Pregunta
It is not a proper access privileges:
Respuesta
  • The owner grants permission to the users to access the content available in the systems
  • All the files are created with access permissions so that unauthorized access can be denied
  • Multi user systems are generally owned by a particular user for instance system admin etc.
  • There ara various classes in java that handle characters streams and byte streams separately
  • None of the above options

Pregunta 18

Pregunta
Which of the following instructions ensures proper File Cleanup when a program terminates?
Respuesta
  • Runtime.getRuntime().exit(1);
  • exit();
  • terminate();
  • out.exit();
  • out.close();

Pregunta 19

Pregunta
"It prevents untrusted code from modifying the class internal layout". In Security Manager Checks, this concept corresponds to:
Respuesta
  • Prevents extracting any data
  • Check Constructor
  • Prevents modification
  • Prevents handling
  • None of the above options

Pregunta 20

Pregunta
The project InputValidation not control one of the following statements?
Respuesta
  • User login
  • User Password
  • Size password
  • User size
  • None of the above options

Pregunta 21

Pregunta
On which side it is recommended to apply input validation?
Respuesta
  • client-side
  • server-side
  • both
  • None of the above

Pregunta 22

Pregunta
Which of the following types of input parameters is the most used in SQL vulnerabilities?
Respuesta
  • Structured text
  • number
  • boolean
  • freetext
  • list of structured text

Pregunta 23

Pregunta
Which of the following types of input parameters is the least used in XSS vulnerabilities?
Respuesta
  • List of free text
  • structured text
  • number
  • boolean
  • enumeration

Pregunta 24

Pregunta
What is the exact description of the regular expression "(a-z A-Z)(a-z A-Z 0-9_$)"?
Respuesta
  • A valid java identifier consisting of alphanumeric characters, undercores and dolar signs with the first characer being an alphabet
  • A valid java identifier consisting of alphanumeric charecters and dollar signs with the first cgaracter bieng an alphabet
  • Any two-digit alphanumeric from 0-99 and a-z
  • Matches az, AZ and 9$

Pregunta 25

Pregunta
Which of the following is not a recommendation of struts validation and securitiy?
Respuesta
  • The absence of validation for a single field may allow attackers to exploit the application
  • Struts validation is done to prevent attacks caused through inchecked input
  • Each and every field included in the form should be validates in the correspondig validation form
  • Input validation through Servet filters in Java web applications is effecvtive due to minor modifications needed for input validation and servlet filets are centralized in nature
  • None of the above

Pregunta 26

Pregunta
Indicate that statement does not belong to the class RuntimeException:
Respuesta
  • ArrayStoreException
  • NegativeArraySizeException
  • FileNotFoundException
  • NullPointerException
  • SecurityException

Pregunta 27

Pregunta
Which of the following is an exceptional behavior erroneous?
Respuesta
  • Never catch NullPointerException
  • Disclosing sensitive information
  • Never throw undeclared checked exceptions
  • Logging sensitive data
  • All of the above

Pregunta 28

Pregunta
Examples of Java Logging Frameworks:
Respuesta
  • Apache Commons Logging
  • Log4J
  • Java Logging API
  • SLF4J
  • All of the above

Pregunta 29

Pregunta
Which of the following is not a Secured Practices in Logging?
Respuesta
  • Log Debug messages inside isDebugEnabled()
  • Make use of good java logging frameworks like java.util.logging or log4j
  • Log messages consitently and the messages must be informative
  • Ensure to include the formar of the java loggind in the specified java logger
  • Ensure to remove temporary files before termination to avoid information leakage and resource exhaustion

Pregunta 30

Pregunta
HTTP Basic Authentication:
Respuesta
  • Request a protected resource - Request username password - Sends username password - returns requested resource
  • Request username password - Sends username password - returns requested resource
  • Request username password - Request a protected resource - Sends username password - returns requested resource
  • Sends username password - Request username password - Request a protected resource - returns requested resource
  • None of the above options

Pregunta 31

Pregunta
Which of the following is not a measure of prevention for attacks weak password?
Respuesta
  • Impose a password againg policy
  • Impose web application accepts only user id credentials that contain all valid characters including special characters like !, @, #, $, etc.
  • Incorrect authentication failure messages should be avoided
  • Implement account lockout policy
  • None of the above

Pregunta 32

Pregunta
Which of the following statements does not describe RBAC?
Respuesta
  • It functions on the concept of user roles and information accessibility
  • This is the popular access control model
  • A user has access to resources based on the role assigned; roles are allocated depending on job function
  • The access control policies are imposed on policy, specific to the user
  • An organization has different departments, and roles are assigned based on requirements

Pregunta 33

Pregunta
Which of the following is not a feature of JAAS?
Respuesta
  • Is implemented usign pure JAVA
  • Supports single sig-on for login authentication in J2EE appplications
  • Provides centralized rol based control that includes hierarchical roles
  • Is implemented usign JAVA and JavaScript
  • Authentication of users is done through PAM Framework

Pregunta 34

Pregunta
JAAS Configuration. The configurations file format consists of the following entries:
Respuesta
  • LoginEntry
  • ModuleClass
  • Flag
  • Option="value"
  • All options are correct

Pregunta 35

Pregunta
In the architecture of a Java EE application. Which of the following is not a component of the Web level?
Respuesta
  • Web Services Client
  • Servlet
  • App Flow Processor
  • View Manager
  • None of the above

Pregunta 36

Pregunta
Concurrency in Java. Which of the following is not a state of a thread?
Respuesta
  • Suspended
  • Resumed
  • Blocked
  • Dead
  • Reset

Pregunta 37

Pregunta
In ]ava, the following methods are vulnerable to race condition:
Respuesta
  • 1) start()
  • 2) stop()
  • 3) init()
  • 4) 1 and 3
  • 5) 1, 2 and 3

Pregunta 38

Pregunta
It is a countermeasure to session hijacking:
Respuesta
  • See the session is not expired after users log out
  • Regularly clear the history and offline content
  • Prefer http than https in case of sensitive and confidential transactions
  • Make sure that cookies and sessions are stored from the browser
  • None of the above

Pregunta 39

Pregunta
Which of the following statements does not include the Java Criptography Arquitecture engine?
Respuesta
  • Key Store
  • Key pair Generator
  • Key Tools
  • CertStore
  • Key Factories

Pregunta 40

Pregunta
javax.net and javax.net.ssl packages are the standard JSSE APIs that includes important classes such as:
Respuesta
  • 1) SSLSocket
  • 2) SocketFactory
  • 3) ServerSocketFactory
  • 4) All of the above
  • 5) None of the above

Pregunta 41

Pregunta
It is not a tool Java Cryptography:
Respuesta
  • JCryption
  • Optimus Java
  • PrimeInk JAva
  • jdnssec
  • Cryptix

Pregunta 42

Pregunta
Which of the following is not a countermeasure CRSF?
Respuesta
  • Appropriately use GET and Post requests
  • Implement OWASP CRFGuard Library
  • Web applications should use weak authentications methods such as cookies, http authentication, etc
  • Check the referrer such as HTTP "referer"
  • None of the above
Mostrar resumen completo Ocultar resumen completo

Similar

DIVISORES...
Ulises Yo
PASO 39. MUNCIPIO VARIOS
Paco Tur Fornés
Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
1ER PARCIAL 6º DERECHO NOCTURNO
Marianela Deleón Romay
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz