Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EC-Council 312-92 Exam - Cheat-Test.com

Free 312-92 Sample Questions:

Q: 1
Harold is programming an application that needs to be incorporate data encryption. Harold decides to utilize an encryption algorithm that uses 4-bit working registers instead of the usual 2-bit working registers. What encryption algorithm has Harold decided to use?
A. Blowfish
B. RC5
C. RC4
D. RC6
Answer: D

Q: 2
What security package is implemented with the following code?
dwStatus = DsMakSpn
(
“ldap”,
“MyServer.Mydomain.com”,
NULL,
0,
NULL,
&pcSpnLength,
pszSpn
);
rpcStatus = RpcServerRegisterAuthInfo
(
psz
RPC_C_AUTHN_GSS_NEGOTIATE,
NULL,
NULL
);
A. Diffie-Hellman encryption
B. Repurposing
C. SSPI
D. SMDT
Answer: A

Q: 3
Steve is using the libcap library to create scripts for capturing and analyzing network traffic. Steve has never used libcap before and is struggling with finding out the correct functions to use. Steve is trying to pick the default network interface in his script and does not know which function to use. Which function would he use to correctly choose the default interface in the script?
A. pcap_open_live
B. pcap_int_default
C. pcap_lookupdev
D. pcap_use_int
Answer: C

Q: 4
Processes having the “CAP_NET_BIND_SERVICE” can listen on which ports?
A. Any TCP port over 1024
B. Any UDP port under 1024
C. Any TCP port under 1024
D. Any UDP port over 1024
Answer: C

Q: 5
David is an applications developer working for Dewer and Sons law firm in Los Angeles David just completed a course on writing secure code and was enlightened by all the intricacies of how code must be rewritten many times to ensure its security. David decides to go through all the
applications he has written and change them to be more secure. David comes across the following snippet in one of his programs:
#include <stdio.h>
int main(int argc, char **argv)
{
int number = 5;
printf(argv[1]);
putchar(‘\n’);
printf(“number (%p) is equal to %d\n”,
&value, value);
}
What could David change, add, or delete to make this code more secure?
A. Change putchar(‘\n’) to putchar(“%s”, ‘\n’)
B. Change printf(argv[1]) to printf(“%s”, argv[1])
C. Change printf(argv[1]) to printf(constv [0])
D. Change int number = 5 to const number = “”
Answer: B

Q: 6
Which Linux command will securely delete a file by overwriting its contents?
A. rm –rf /
B. Shred
C. ps –rm
D. del –rm
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved