PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 312-92

Exam 312-92: EC-Council Certified Secure Programmer (ECSP)

What set of security standards should George ensure the software he purchases be developed under?

George is the CIO for the US Department of Defense. George’s education and work experience
cover everything from Systems Administration to developing complex software programs for the
government. With many new federal regulations put forth by the US Department of Homeland
Security, every single aspect of George’s control must be secured and protected from attack.
George is currently looking to purchase customized communications software for sending instant
messages to branches of the DoD all over the world.
What set of security standards should George ensure the software he purchases be developed
under?

What is Neil trying to create here?

Neil is almost finished developing a Web-based inventorytracking application for a company he is
working for under contract. Neil finds out that the company wants to pay him half of what they had
agreed upon so he is very angry. Neil decides to insert the following code into his application.
What is Neil trying to create here?
#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[])
{
char buffer[10];
if (argc < 2)
{

fprintf(stderr, “USAGE: %s
string\n”, argv[0]);
return 1;
}
strcpy(buffer, argv[1]);
return 0;
}

What Java security feature can Kyle use in the development of the site to add security?

Kyle is a web developer for Innovative Incorporated, a web development and graphics designing
company in Dallas. Kyle is currently working on a web-based application for a client that wants
dynamic and rich content on their site. Kyle is going to use java applets and flash animation to
make the website really stand out. The client was adamant though about making sure the site
used security features to ensure that the site itself and visitors alike would not have issues. What
Java security feature can Kyle use in the development of the site to add security?

What type of testing is Harold performing against his program?

Harold is developing software for the company he works for to aid in their human resources and
payroll procedures. Harold is almost done working on the program, currently working in the testing
phase. Since Harold’s supervisors and the company executives are going to consider this a
mission critical program, they want it to be tested to the fullest. Harold decides to test the program
using higher than normal simulated loads and requests. What type of testing is Harold performing
against his program?


Page 3 of 1012345...10...Last »