Certbus > EC-COUNCIL > EC-COUNCIL Certifications > 312-92 > 312-92 Online Practice Questions and Answers

312-92 Online Practice Questions and Answers

Questions 4

Harold is programming an application that needs to be incorporate data encryption. Harold decides to utilize an encryption algorithm that uses 4-bit working registers instead of the usual 2- bit working registers. What encryption algorithm has Harold decided to use?

A. Blowfish

B. RC5

C. RC4

D. RC6

Browse 99 Q&As
Questions 5

Shayla is designing a web-based application that will pass data to and from a company extranet. This data is very sensitive and must be protected at all costs. Shayla will use a digital certificate and a digital signature to protect the data. The digital signature she has chosen to use is based on the difficulty in computing discrete logarithms.

Which digital signature has she chosen?

A. Rabin

B. Diffie-Hellman

C. SA-PSS

D. ElGamal

Browse 99 Q&As
Questions 6

What is the new lightweight audit framework that is built into Red Hat Linux Enterprise?

A. HelperReview

B. Audit2

C. SOCK review

D. RedHat review

Browse 99 Q&As
Questions 7

George is the CIO for the US Department of Defense. George's education and work experience cover everything from Systems Administration to developing complex software programs for the government. With many new federal regulations put forth by the US Department of Homeland Security, every single aspect of George's control must be secured and protected from attack. George is currently looking to purchase customized communications software for sending instant messages to branches of the DoD all over the world.

What set of security standards should George ensure the software he purchases be developed under?

A. Common Criteria

B. ISO 199776

C. Code Containment

D. Code Access Security

Browse 99 Q&As
Questions 8

What will the following script accomplish?

for (int i=0; i

if (HttpCookie.domainMatches(blacklist[i],

host))

return false;

A. Create a list of blacklist domains

B. Check domains against a blacklist

C. Prevent site from being blacklisted

D. Delete entries in a blacklist file

Browse 99 Q&As
Questions 9

Simon is going through some of Heather's code and notices an issue. What issue did Simon find in the following code?

void f4(void * arg, size_t len)

{

char *buff = new char[100];

C *ptr = new C;

memcpy(buff, arg, len);

ptr->vf();

return;

}

A. Function pointer clobbering

B. Null-termination

C. Data pointer modification

D. Virtual pointer smashing

Browse 99 Q&As
Questions 10

Malory is creating a webpage in PHP where users will have to logon to gain access to certain areas of the site. Malory is concerned that malicious users might try to exploit her site, so she decides to use the following code to prevent some

attacks.

What is Malory trying to prevent here?

$username = addslashes($_POST["username"]);

$password = addslashes($_POST["password"]);

A. SQL injection

B. CSS attack

C. Reflected mode XSS attack

D. CSRF attack

Browse 99 Q&As
Questions 11

What functionality of the Oracle Identity Management system facilitates real-time integration of multiple directories and user repositories through a single LDAP service?

A. Access and Identity

B. Virtual directory

C. Federation

D. Provisioning

Browse 99 Q&As
Exam Code: 312-92
Exam Name: EC-Council Certified Secure Programmer v2 (ECSP)
Last Update: Mar 15, 2025
Questions: 99 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99