Exam Details

  • Exam Code
    :312-92
  • Exam Name
    :EC-Council Certified Secure Programmer v2
  • Certification
    :ECSP
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :99 Q&As
  • Last Updated
    :

EC-COUNCIL ECSP 312-92 Questions & Answers

  • Question 31:

    Gerald is a web security consultant for Protectors International. Gerald's main responsibility is to search the Internet for malicious and deceitful sites that the public should be aware of. Gerald was tipped off about a particular site and is now

    looking over its source code in a protected environment. Gerald finds the following snippet particularly interesting. What has Gerald stumbled upon?

    A. Hidden post command

    B. Hidden form fields

    C. JavaScript hijacking

    D. XSS attack

  • Question 32:

    What type of problem or error will result from the following statement?

    void f2b(void * arg, size_t len)

    {

    char buffer[100];

    long val = ...;

    long *ptr = ...;

    extern void (*f)();

    memcpy(buff, arg, len);

    *ptr = val;

    f();

    return;

    }

    A. Pointer subterfuge

    B. Heap smashing

    C. Virtual pointer smashing

    D. Sign error

  • Question 33:

    Gloria is the lead operation manager for a movie production company in Las Vegas. She has been asked with ensuring that the new movie created by the company will fit on one side of a DVD disk that will be sold to the public. If the movie mentioned is a full-length production and must fit on one side of the disk, what level of compression must Gloria use?

    A. 100 Mb/s

    B. 10.5 Mb/s

    C. 3.8 Mb/s

    D. 7.2 Mb/s

  • Question 34:

    What functionality of the Oracle Identity Management system facilitates real-time integration of multiple directories and user repositories through a single LDAP service?

    A. Access and Identity

    B. Virtual directory

    C. Federation

    D. Provisioning

  • Question 35:

    In the following socket programming code, who will the server allow connections from?

    int main(void)

    {

    int s1, s2;

    s1 = socket(AF_INET, SOCK_STREAM, 0);

    sin.sin_port = htons(30);

    sin.sin_family = AF_INET;

    sin.sin_addr.s_addr = 0;

    bind(sockfd, (struct sockaddr *)andsin, sizeof(sin));

    listen(sockfd, 10);

    s2 = accept(sockfd, 10);

    write(s2, "hello\n", 6)

    }

    A. Only those coming in on TCP port 10

    B. Only those on the same subnet as the server

    C. Only those coming in on UDP port 10

    D. Anyone

  • Question 36:

    Kevin wants to use an SSL certificate from his Mac OS X server so that he can send and receive encrypted email. What would Kevin accomplish by typing in the following command? certtool c k=/Users/root/Library/Keychains/certkc

    A. Remove any unnecessary permissions on the file "certkc"

    B. Create keychain called "certkc"

    C. Copy the root certificate of the server to the file "certkc"

    D. Import encryption key into the file "certkc"

  • Question 37:

    Fred has just finished developing a number of ASP pages that will be posted to his company's website. Fred does not want the page's source code viewed by anyone, so he decided to encode the pages to make the source code unusable.

    What will the following command accomplish?

    screnc /e asp *.* c:\tmp

    A. Create an MD5 hash for all ASP files in the c:\tmp directory

    B. Encode all ASP files in current directory as ASP files and place them in the c:\tmpdirectory

    C. Encode all ASP files and place them in the c:\tmp directory

    D. Encode all ASP files in in the c:\tmp and place them in the default IIS virtual directory

  • Question 38:

    Jacob is the system administrator for his company, managing over 20 Linux-based servers.

    Jacob wants to ensure that his servers are secure so he decides to add the following line to the /etc/sysctl.conf file:

    net.ipv4.conf.all.rp_filter = 1

    What will this line accomplish?

    A. Prevent spoofing of incoming packets that appear to be from the computer's defaultgateway

    B. Prevent spoofing of incoming packets that appear to be from local machine

    C. Allow incoming packets only from own subnet

    D. Allow outgoing packets only through primary network card

  • Question 39:

    What testing methodology does not require any knowledge of the internal design or code of a software application?

    A. Integration testing

    B. White box testing

    C. Black box testing

    D. Unit testing

  • Question 40:

    Travis is working on some code in C# that will create a digital signature. What will the following snippet from his program accomplish? childkat.xml signnode = xmlDoc.NewChild("signature", "")

    A. Create XML node to hold signature

    B. Verify the XML signature

    C. Checks to make sure the signature is valid and still usable

    D. Tells the algorithm which signature to use

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-92 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.