2018 Jan ECCouncil Official New Released 312-92
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Secure Programmer (ECSP)

Question No: 51

Megan has just build a new kernel using the command make bzImage. Where can Megan go now to see the newly created kernel?

  1. /etc/lino.conf

  2. /etc/dev/boot/bzImage

  3. /boot/mynewkernel/bzImage

  4. /usr/src/linux/arch/i386/boot/bzImage

Answer: D

Question No: 52

Why would a software development firm want to fix any issues with a program at the design stage as opposed to fixing issues with a program through a patch release?

  1. Releasing a patch costs 25 times as much as fixing the issue in the design stage

  2. Releasing a patch costs 5 times as much as fixing the issue in the design stage

  3. Releasing a patch is actually the most efficient and cost effective way of solving issues

  4. Releasing a patch costs 60 times as much as fixing the issue in the design stage

Answer: D

Question No: 53

Fred wants to create his web page using AJAX to make them dynamic and give them the ability to use and share data. After an internal auditor examines the compliance of Fred#39;s page, he says that they cannot be used if external visitors will be accessing the pages.

Why would the auditor not let Fred publish the pages written with AJAX?

  1. Users with Java enabled will not be able to read pages

  2. Not supported in older browsers

  3. Users with XML enabled will not be able to read pages

  4. Not supported in newer browsers

Answer: B

Question No: 54

Lyle is writing some code in VB.NET and is implementing some build-in security. What type of .NET security is Lyle using in the following code?

public class Myclass1 Public Sub New() End Sub

Public Sub MyMethods()

Dim Perm As New MyPermission() Perm.Demand()

End Sub

Pub Sub YourMethod() End Sub

End Class

  1. Imperative security

  2. Explicit security

  3. Implicit security

  4. Declarative security

Answer: A

Question No: 55

What would be the output of the following script?


public class ExampleByName { public static void main(String[] args) {



InetAddress.getByName(;); System.out.println(address);


catch (UnKnownHostException e) { System.out.println(quot;Could not find;)



  1. IP address of

  2. Hexadecimal equivalent for

  3. Tracert information to the

  4. Whois information for

Answer: A

Question No: 56

Versions Unlimited, a software design company in Seattle, has just finished development of a new mapping software product. They have completed testing the internal code and are now ready to involve users other than programmers in the testing. Versions Unlimited invites internal employees and some external users to come to their company and test the product in a controlled environment.

What type of testing is Versions Unlimited currently undertaking?

  1. Alpha testing

  2. Open box testing

  3. Regression testing

  4. Beta testing

Answer: A

Question No: 57

When the following code is compiled and run is a program what size block will be used to hold name string?

#include lt;stdio.hgt;

int main(int argc, char **argv)


char target[5]=quot;TTTTquot;;

char attacker[11]=quot;AAAAAAAAAAquot;; strcpy(attacker, quot; DDDDDDDDDDDDDDquot;); printf(quot;% \nquot;, target);

return 0;


  1. 16 bytes

  2. 28 bytes

  3. 32 bytes

  4. 8 bytes

Answer: C

Question No: 58

Nathan, an application developer, has taken over the lead developer#39;s position and now will administer five other developers. The last lead developer was a programmer specialized in Xcode. Nathan is not familiar with Xcode at all, but will have to learn it to develop

programs for company. Nathan come across some code left by the past developer:

set this_file to choose file with prompt quot;Scale your image to 25%quot; try

tell application quot;Image Capture Scriptingquot;

set this_image to open this_file scale this_image by factor 0.35 save this_image in this_file close this_image

end tell

on error error_message beep

buttons {quot;Process failedquot;)default button1

end try

  1. Carbon

  2. AppleTalk

  3. AppleScript

  4. Cocoa

Answer: D

Question No: 59

What testing methodology does not require any knowledge of the internal design or code of a software application?

  1. Integration testing

  2. White box testing

  3. Black box testing

  4. Unit testing

Answer: C

Question No: 60

Travis is working on some code in C# that will create a digital signature. What will the

following snippet from his program accomplish? childkat.xml signnode = xmlDoc.NewChild(quot;signaturequot;, quot;quot;)

  1. Create XML node to hold signature

  2. Verify the XML signature

  3. Checks to make sure the signature is valid and still usable

  4. Tells the algorithm which signature to use

Answer: A

100% Free Download!
Download Free Demo:312-92 Demo PDF
100% Pass Guaranteed!
Download 2018 Latesttests 312-92 Full Exam PDF and VCE

Latesttests ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 Latesttests IT Certification PDF and VCE