[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-92 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-92
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Secure Programmer (ECSP)

Question No: 41

Jacob just purchased the BlueFire Mobile Security Enterprise software package for all his company’s mobile devices. Jacob wants to configure the software so that it will quarantine a device by blocking all incoming and outgoing network communication if a breach or violation has occurred. What feature of the BlueFire software will be able to accomplish this?

  1. Integrity manager

  2. Device isolation

  3. Mobile quarantine

  4. Veracity verifier

Answer: A

Question No: 42

Simon is writing an application that will use RPC to talk between a client and server. He will use authentication, but in his application the server does not have to know the RPC

caller’s identity. What type of RPC authentication can Simon use for this application?

  1. UNIX authentication

  2. ANONYMOUS authentication

  3. DES authentication

  4. NULL authentication

Answer: B

Question No: 43

What two encryption methods are used by the Secure Electronic Transaction system?

  1. RSA

  2. AES

  3. DES

  4. 3DES

Answer: A,C

Question No: 44

Kevin is developing a webpage using html and javascript code. The webpage will have a lot of important content and will have a number of functions that Kevin does not want revealed through the source code. Why would Kevin choose to employ HTML Guardian to hide the source code of his webpage?

  1. HTML Guardian disables the “view source” option when users browse to the page

  2. HTML Guardian makes it so that nothing can be seen at all when viewing the source code

  3. HTML Guardian wraps the code up into include files

  4. HTML Guardian encrypts html and javascript code

Answer: D

Question No: 45

Clay is a SQL dba working for Integrated Solutions Inc., a graphics design company in Miami. Clay administers 10 SQL servers at the company’s headquarters. Clay wants to ensure that all SQL traffic stays within the internal network and no SQL traffic from the outside can get into the internal network. What ports should Clay tell the network team to

close off at the firewall to disallow all incoming and outgoing SQL traffic?

A. 1499

B. 1433

C. 389

D. 1434

Answer: B,D

Question No: 46

Simon is going through some of Heather’s code and notices an issue. What issue did Simon find in the following code?

void f4(void * arg, size_t len)


char *buff = new char[100]; C *ptr = new C; memcpy(buff, arg, len);

ptr-gt;vf(); return;


  1. Function pointer clobbering

  2. Null-termination

  3. Data pointer modification

  4. Virtual pointer smashing

Answer: D

Question No: 47

Lori is creating a login page using Java on one of her websites with the following code. What vulnerability or issue is the code susceptible to?

conn = pool.getConnection();

String sql = “select * from user where username='” “‘ and password='” password “‘”;

stmt = conn.createstatement(); rs = stmt.executeQuery(sql);

if (rs.next())


loggedIn = true; out.println(“Successfully logged in”);




out.println(“Username and/or password not valid”);


  1. SQL injection

  2. Directory transversal

  3. SQL slamming

  4. Query string manipulation

Answer: A

Question No: 48

Malory is creating a webpage in PHP where users will have to logon to gain access to certain areas of the site. Malory is concerned that malicious users might try to exploit her site, so she decides to use the following code to prevent some attacks. What is Malory trying to prevent here?

$username = addslashes($_POST[“username”]);

$password = addslashes($_POST[“password”]);

  1. SQL injection

  2. CSS attack

  3. Reflected mode XSS attack

  4. CSRF attack

Answer: A

Question No: 49

Tyler is in the applicaion testing phase of a particular project. He has decided to use the White Box testing method. Tyler has made a number of changes to his code after some initial tests found some bugs. Tyler now needs to test the code with those changes in place.

What type of testing is Tyler getting ready to perform?

  1. Integration testing

  2. Mutation testing

  3. Statement coverage testing

  4. Branch coverage testing

Answer: B

Question No: 50

Julie wants to use some of the Security and Trust Services API#39;s for a program she is writing that will work with mobile devices. Which SATSA security package should Julie use if she needs to support basic user-certificate management?

  1. javax.crypto.pki

  2. javax.microedition.crypto

  3. javax.microedition.pki

  4. javax.security.crypto

Answer: D

100% Ensurepass Free Download!
Download Free Demo:312-92 Demo PDF
100% Ensurepass Free Guaranteed!
312-92 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.