Exam Details

  • Exam Code
    :312-92
  • Exam Name
    :EC-Council Certified Secure Programmer v2
  • Certification
    :ECSP
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :99 Q&As
  • Last Updated
    :May 15, 2024

EC-COUNCIL ECSP 312-92 Questions & Answers

  • Question 41:

    What is the security and cryptographic framework used in Mac OS X called?

    A. AppleSecure

    B. CSAPI

    C. CDSA

    D. Secure API

  • Question 42:

    When the following code is compiled and run is a program what size block will be used to hold name string?

    #include

    int main(int argc, char **argv)

    {

    char target[5]="TTTT";

    char attacker[11]="AAAAAAAAAA";

    strcpy(attacker, " DDDDDDDDDDDDDD");

    printf("% \n", target);

    return 0;

    }

    A. 16 bytes

    B. 28 bytes

    C. 32 bytes

    D. 8 bytes

  • Question 43:

    Nathan, an application developer, has taken over the lead developer's position and now will administer five other developers. The last lead developer was a programmer specialized in Xcode. Nathan is not familiar with Xcode at all, but will have to learn it to develop programs for company. Nathan come across some code left by the past developer: set this_file to choose file with prompt "Scale your image to 25%" try tell application "Image Capture Scripting" set this_image to open this_file scale this_image by factor 0.35 save this_image in this_file close this_image end tell on error error_message beep buttons {"Process failed")default button1 end try

    A. Carbon

    B. AppleTalk

    C. AppleScript

    D. Cocoa

  • Question 44:

    Lyle is writing some code in VB.NET and is implementing some build-in security. What type of .NET security is Lyle using in the following code?

    public class Myclass1

    Public Sub New()

    End Sub

    Public Sub MyMethods()

    Dim Perm As New MyPermission()

    Perm.Demand()

    End Sub

    Pub Sub YourMethod()

    End Sub

    End Class

    A. Imperative security

    B. Explicit security

    C. Implicit security

    D. Declarative security

  • Question 45:

    What would be the output of the following script?

    import java.net*;

    public class ExampleByName {

    public static void main(String[] args) {

    try

    {

    InetAddress.getByName(www.microsoft.com");

    System.out.println(address);

    }

    catch (UnKnownHostException e) {

    System.out.println("Could not find www.microsoft.com")

    }

    }

    A. IP address of www.microsoft.com

    B. Hexadecimal equivalent for www.microsoft.com

    C. Tracert information to the www.microsoft.com

    D. Whois information for www.microsoft.com

  • Question 46:

    Versions Unlimited, a software design company in Seattle, has just finished development of a new mapping software product. They have completed testing the internal code and are now ready to involve users other than programmers in the testing. Versions Unlimited invites internal employees and some external users to come to their company and test the product in a controlled environment.

    What type of testing is Versions Unlimited currently undertaking?

    A. Alpha testing

    B. Open box testing

    C. Regression testing

    D. Beta testing

  • Question 47:

    Fred wants to create his web page using AJAX to make them dynamic and give them the ability to use and share data. After an internal auditor examines the compliance of Fred's page, he says that they cannot be used if external visitors will be accessing the pages.

    Why would the auditor not let Fred publish the pages written with AJAX?

    A. Users with Java enabled will not be able to read pages

    B. Not supported in older browsers

    C. Users with XML enabled will not be able to read pages

    D. Not supported in newer browsers

  • Question 48:

    Julie wants to use some of the Security and Trust Services API's for a program she is writing that will work with mobile devices. Which SATSA security package should Julie use if she needs to support basic user-certificate management?

    A. javax.crypto.pki

    B. javax.microedition.crypto

    C. javax.microedition.pki

    D. javax.security.crypto

  • Question 49:

    Megan has just build a new kernel using the command make bzImage. Where can Megan go now to see the newly created kernel?

    A. /etc/lino.conf

    B. /etc/dev/boot/bzImage

    C. /boot/mynewkernel/bzImage

    D. /usr/src/linux/arch/i386/boot/bzImage

  • Question 50:

    Why would a software development firm want to fix any issues with a program at the design stage as opposed to fixing issues with a program through a patch release?

    A. Releasing a patch costs 25 times as much as fixing the issue in the design stage

    B. Releasing a patch costs 5 times as much as fixing the issue in the design stage

    C. Releasing a patch is actually the most efficient and cost effective way of solving issues

    D. Releasing a patch costs 60 times as much as fixing the issue in the design stage

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-92 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.