Vcehome > EC-COUNCIL > ECSP > 312-92 > 312-92 Online Practice Questions and Answers

312-92 Online Practice Questions and Answers

Questions 4

Wayne is a gaming software developer for a large video gaming company in Los Angeles. Wayne has just completed developing a new action/adventure game for the company that is to be released soon. To protect the company's copyright on the game, Wayne would like to incorporate a technology that will restrict the use of the digital files by controlling access, altering, sharing, copying, printing, and saving.

What technology does Wayne want to use?

A. ARM

B. WRM

C. DRM

D. Diffusion

Browse 99 Q&As
Questions 5

Kenny is the CIO for Fredrickson Entertainment, a gaming software company in Omaha. The developers in Kenny's company have just finished creating a 3D first person shooter game that will be released to the market within the next couple of months. Kenny is trying to decide what type of license or activation code structure they should use for the game to prevent piracy and protect their product. Kenny decides to go with an approach that will allow each sold copy to be activated online up to five times because he knows his users might have multiple PCs or might need to reinstall the product at some point.

What type of activation policy has Kenny decided to go with?

A. Loose license enforced - reasonable use

B. License terms enforced - fair use

C. Strict license terms enforced

D. Monitor only mode

Browse 99 Q&As
Questions 6

Devon is an applications developer that just got back from a conference on how to correctly write code. Devon has a number of programs he has written that access data across WAN links, so he is particularly concerned about their security. Devon writes a script in C++ to check the security of the programs running on his internal servers. What will the following code from Devon's script accomplish?

#include #include #include

using namespace std;

bool tryPort(int p);

string target("");

int main(int argC, char *argV[])

{

printf("PlagueZ port scanner 0.1\n");

int startPort = getInt("start Port: ");

int endPort = getInt("end Port: ");

target = getString("Host: ");

printf("[Processing port %d to %d]\n",

startPort, endPort);

for(int i=0; i

{

printf("[Trying port: %d]\n", i);

if(tryPort(i)) // port open

printf("[Port %d is open]\n", i);

}

printf("------Scan Finished-------\n");

system("pause");

return 0;

}

bool tryPort(int p)

{

SocketClient *scan;

try

{

scan = new SocketClient(target, p);

}

catch(int e) { delete andscan; return

false; }

delete andscan;

return true;

}

A. Scan the perimeter firewall for DoS vulnerabilities

B. Create socket connections to the remote sites to check their security

C. Close off any ports used by malicious code

D. Scan for open ports

Browse 99 Q&As
Questions 7

Harold is developing software for the company he works for to aid in their human resources and payroll procedures. Harold is almost done working on the program, currently working in the testing phase. Since Harold's supervisors and the company executives are going to consider this a mission critical program, they want it to be tested to the fullest. Harold decides to test the program using higher than normal simulated loads and requests.

What type of testing is Harold performing against his program?

A. Load test

B. Stress test

C. User acceptance test

D. Load-pressure test

Browse 99 Q&As
Questions 8

Paul wants to capture audit information on PLSQL so he executes the following command:

sqlplus "sys / as sysdba"

Enter password: password123!!!!

SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS

SCOPE=SPFILE;

SQL> SHUTDOWN NORMAL;

SQL> STARTUP;

What privileges has Paul logged on with?

A. ADMIN

B. Root

C. SYSDBA

D. SYS

Browse 99 Q&As
Questions 9

Megan has just build a new kernel using the command make bzImage. Where can Megan go now to see the newly created kernel?

A. /etc/lino.conf

B. /etc/dev/boot/bzImage

C. /boot/mynewkernel/bzImage

D. /usr/src/linux/arch/i386/boot/bzImage

Browse 99 Q&As
Questions 10

What will the following SQL command accomplish? USE Accounting GO EXECUTE sp_grantdbaccess guest

A. Add guest user to the Accounting security group

B. Change default database for guest user to Accounting database

C. Add guest group to the Accounting database

D. Add guest user to the Accounting database

Browse 99 Q&As
Questions 11

What vulnerability is the following code susceptible to?

CREATE OR REPLACE PROCEDURE demo (name in VARCHAR2) as

cursor_name INTEGER;

rows_processed INTEGER;

sql VARCHAR2(150);

code VARCHAR2(2);

BEGIN

...

sql := 'SELECT postal_code FROM states WHERE state_name = '''

|| '''';

cursor_name := dbms_sql.open_cursor;

DBMS_SQL.PARSE(cursor_name, sql, DBMS_SQL.NATIVE);

DBMS_SQL.DEFINE_COLUMN(cursor_name, 1, code, 10);

row_processed:= DMBS_SQL.EXECUTIVE(cursor_name);

DBMS_SQL.CLOSE_CURSOR(cursor_name);

A. SQL string manipulation

B. DBMS_Open string attacks

C. Oracle injection

D. SQL injection

Browse 99 Q&As
Questions 12

William, a software developer just starting his career, was asked to create a website in PHP that would allow visitors to enter a month and a year for their birth date. The PHP code he creates has to validate the input after it is entered. If

William uses the following code, what could a malicious user input to the year value to actually delete the whole website?

$month = $_GET['month'];

$year = $_GET['year'];

exec("cal $month $year", $result);

print "

"; 

foreach($result as $r)

{

print "$r
";

}

print "

";

A. ";gf -rm *"

B. ";dfr -php *"

C. ";php -rf *"

D. ";rm -rf *"

Browse 99 Q&As
Questions 13

What type of encryption will be used from the following code? Dim Publickey As Byte() = {214,46,220,83,160,73,40,39,201

155,19,202,3,11,191,178,56,74,90,36,248,103,

18,144,170,163,145,87,54,61,34,220,222,207,

137,149,173,14,92,120,206,222,158,28,40,24,

30,16,175,108,128,35,203,118,40,121,113,125,

216,130,11,24,9,0,48,194,240,105,44,76,34,57,

249,228,125,80,38,9,136,29,117,207,139,168,181,

85,137,126,10,126,242,120,247,121,8,100,12,201,

171,38,226,193,180,190,117,177,87,143,242,213,

11,44,18,0,113,93,106,99,179,68,175,211,164,116,

64,148,226,254,172,147}

Dim Exponent As Byte() = {1,0,1}

Dim Encrypted SymmetricKey() As Byte

Dim Encrypted SymmetricIV() As Byte

Dim RSA as New RSACryptoServiceProvider()

Dim RSAKeyInfo As New RSAParameters()

RSAKeyInfo.Modules = PublicKey

RSAKeyInfo.Exponent = Exponent

RSA.ImportParameters(RSAKeyInfo)

Dim RM As New RijendaelManaged()

EncryptedSymmetricKey = RSA.Encrypt(RM.Key,False)

EncryptedSymmetricIV = RSA.Encrypt(RM.Key,False)

A. Symmetric encryption

B. MITM encryption

C. Reverse-key encryption

D. Asymmetric encryption

Browse 99 Q&As
Exam Code: 312-92
Exam Name: EC-Council Certified Secure Programmer v2
Last Update: Apr 25, 2024
Questions: 99 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99