Pass4itsure > EC-COUNCIL > ECSP > 312-92 > 312-92 Online Practice Questions and Answers

312-92 Online Practice Questions and Answers

Questions 4

Jay is using the EnTrial Key Generator software to create software keys for the programs he has created. To create the unlock key in the software, what two inputs must Jay use?

A. Vector markup ID

B. Personal ID

C. GUID

D. Generated code

Buy Now
Questions 5

George is the CIO for the US Department of Defense. George's education and work experience cover everything from Systems Administration to developing complex software programs for the government. With many new federal regulations put forth by the US Department of Homeland Security, every single aspect of George's control must be secured and protected from attack. George is currently looking to purchase customized communications software for sending instant messages to branches of the DoD all over the world.

What set of security standards should George ensure the software he purchases be developed under?

A. Common Criteria

B. ISO 199776

C. Code Containment

D. Code Access Security

Buy Now
Questions 6

Heather has built a new Linux kernel for her machine and wants to use the grub boot loader. Which file should she edit to tell the computer how to boot up properly?

A. /boot/grub/menu.lst

B. /usr/src/linux/arch/i386/boot/menu.lst

C. /etc/dev/boot/menu.lst

D. /etc/boot/lilo.conf

Buy Now
Questions 7

What function can be used with SQL to encrypt user suppliedpasswords so that they can be compared with the encrypted passwords stored on the SQL server?

A. DESpassword()

B. userencrypt()

C. passwordin()

D. pwdencrypt()

Buy Now
Questions 8

Lyle is writing some code in VB.NET and is implementing some build-in security. What type of .NET security is Lyle using in the following code?

public class Myclass1

Public Sub New()

End Sub

Public Sub MyMethods()

Dim Perm As New MyPermission()

Perm.Demand()

End Sub

Pub Sub YourMethod()

End Sub

End Class

A. Imperative security

B. Explicit security

C. Implicit security

D. Declarative security

Buy Now
Questions 9

When the following code is compiled and run is a program what size block will be used to hold name string?

#include

int main(int argc, char **argv)

{

char target[5]="TTTT";

char attacker[11]="AAAAAAAAAA";

strcpy(attacker, " DDDDDDDDDDDDDD");

printf("% \n", target);

return 0;

}

A. 16 bytes

B. 28 bytes

C. 32 bytes

D. 8 bytes

Buy Now
Questions 10

What compression library is used by wiretap, the packet analyzer reader for Wireshark?

A. wtapbil

B. pclib

C. winrar

D. zllib

Buy Now
Questions 11

Harold is creating an Oracle Label Security Policy on his server. He has define the policy and defined the components of the labels already. Now Harold creates the labels dynamically using the TO_DATA_LABEL function:

INSERT INTO emp (ename, empnum, hr_label)

VALUES ('FGRIFFIN', 10 to_data_label ('HR', 'SENSITIVE'));

Harold gets an error reffering to permission when he tries to run this function. What authority must Harold have to run the TO_DATA_LABEL function?

A. EXECUTE

B. WRITE

C. INSERT

D. CREATE

Buy Now
Questions 12

What encryption algorithm is used by PERL crypt() function?

A. Skipjack

B. 3DES

C. DES

D. AES

Buy Now
Questions 13

William, a software developer just starting his career, was asked to create a website in PHP that would allow visitors to enter a month and a year for their birth date. The PHP code he creates has to validate the input after it is entered. If

William uses the following code, what could a malicious user input to the year value to actually delete the whole website?

$month = $_GET['month'];

$year = $_GET['year'];

exec("cal $month $year", $result);

print "

"; 

foreach($result as $r)

{

print "$r
";

}

print "

";

A. ";gf -rm *"

B. ";dfr -php *"

C. ";php -rf *"

D. ";rm -rf *"

Buy Now
Exam Code: 312-92
Exam Name: EC-Council Certified Secure Programmer v2
Last Update: Mar 22, 2024
Questions: 99
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99