Exam Details

  • Exam Code
    :312-92
  • Exam Name
    :EC-Council Certified Secure Programmer v2
  • Certification
    :ECSP
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :99 Q&As
  • Last Updated
    :May 15, 2024

EC-COUNCIL ECSP 312-92 Questions & Answers

  • Question 21:

    What is the following shellcode trying to accomplish?

    int main(void) {

    mkdir("A");

    chdir("A");

    chroot("..//..//..//..//..//..//..//..//");

    system("/bin/sh")

    A. Corrupt the Linux kernel

    B. Break out of "chroot jail"

    C. Traverse to the /bin/sh directory

    D. Create a buffer overflow

  • Question 22:

    Harold is creating an Oracle Label Security Policy on his server. He has define the policy and defined the components of the labels already. Now Harold creates the labels dynamically using the TO_DATA_LABEL function:

    INSERT INTO emp (ename, empnum, hr_label)

    VALUES ('FGRIFFIN', 10 to_data_label ('HR', 'SENSITIVE'));

    Harold gets an error reffering to permission when he tries to run this function. What authority must Harold have to run the TO_DATA_LABEL function?

    A. EXECUTE

    B. WRITE

    C. INSERT

    D. CREATE

  • Question 23:

    Yancey has just finished downloading the Valgrind suite to use in his application development. Yancey is most concerned about the possibility of memory-management issues in his programs. What tool included in Valgrind suite can Yancey use to detect memory-management related issues?

    A. Massif

    B. Cachegrind

    C. Memcheck

    D. MemoryGuard

  • Question 24:

    When a developer is creating port binding shell code, why should he/she not use the NULL characters?

    A. Creates hardware call errors

    B. Create firmware vulnerabilities with hardware

    C. Create buffer overflow

    D. Create open sockets

  • Question 25:

    William is the lead programmer for Gummerson, Inc., a software company located in San Francisco. Gummerson is looked upon as one of the leading software development companies for medical and health related applications. William believes that his company is so successful because they believe in involving the user or client in the design and development of the programs.

    What software development methodology does Gunnerson, Inc. use when creating applications for clients?

    A. Fountain

    B. RAD

    C. JAD

    D. Waterfall

  • Question 26:

    Harold is writing a J2ME program that run an inventory application on his company's PDAs.

    Employees will use their PDA to scan barcodes into the program Harold is writing. Harold is very concerned about securing his program's code and ensuring its integrity once it is utilized. Harold particularly wants to stop the execution of class

    files loaded in the virtual machine in any way, what is not allowed by java virtual machine specification.

    What level of J2ME security should Harold implement to accomplish this?

    A. High-end security

    B. End-to-end security

    C. Low-level-security

    D. Application level security

  • Question 27:

    What compression library is used by wiretap, the packet analyzer reader for Wireshark?

    A. wtapbil

    B. pclib

    C. winrar

    D. zllib

  • Question 28:

    What is the following PERL script trying to accomplish? sub mycode_string {

    join(""

    map('$_ > 255 ?

    sprintf("\\x{%04x]", $_) :

    chr($_) = ~ /[[:cntrl:]]/ ?

    sprintf(\\x%02X", $_) :

    chr($_)

    } unpack("u*", $_[0]))l

    }

    A. Convert hexadecimal to Unicode

    B. Display test as Unicode

    C. Convert hexadecimal to text

    D. Display Unicode as text

  • Question 29:

    What will the following SQL command accomplish? USE Accounting GO EXECUTE sp_grantdbaccess guest

    A. Add guest user to the Accounting security group

    B. Change default database for guest user to Accounting database

    C. Add guest group to the Accounting database

    D. Add guest user to the Accounting database

  • Question 30:

    When making a RPC function call on the local machine, what function should be used?

    A. ncacn_ip_tcp

    B. lclrpc

    C. ncalrpc

    D. get_local_rpc

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-92 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.