Devon is writing the following code to avoid what?
A. Type safety
B. GET source code path
C. Parent path tampering
D. Canonicalization
Jacob just purchased the BlueFire Mobile Security Enterprise software package for all his company's mobile devices. Jacob wants to configure the software so that it will quarantine a device by blocking all incoming and outgoing network communication if a breach or violation has occurred.
What feature of the BlueFire software will be able to accomplish this?
A. Integrity manager
B. Device isolation
C. Mobile quarantine
D. Veracity verifier
Paul wants to capture audit information on PLSQL so he executes the following command:
sqlplus "sys / as sysdba"
Enter password: password123!!!!
SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS
SCOPE=SPFILE;
SQL> SHUTDOWN NORMAL;
SQL> STARTUP;
What privileges has Paul logged on with?
A. ADMIN
B. Root
C. SYSDBA
D. SYS
Heather has built a new Linux kernel for her machine and wants to use the grub boot loader. Which file should she edit to tell the computer how to boot up properly?
A. /boot/grub/menu.lst
B. /usr/src/linux/arch/i386/boot/menu.lst
C. /etc/dev/boot/menu.lst
D. /etc/boot/lilo.conf
Jonathan is creating an XML document and needs to sign data streams. In his code, Jonathan creates a signature node that is contained within the signed datastream. What type of signature signing has Jonathan employed here?
A. Enveloping
B. Attached
C. Detached
D. Enveloped
Victor is creating an online shopping cart for his company that will accept credit cards as payment.
What protocol that provides open encryption and security specifications designed to protect credit card transactions should Victor use?
A. PET
B. DES
C. SET
D. GRAWP
What function can be used with SQL to encrypt user suppliedpasswords so that they can be compared with the encrypted passwords stored on the SQL server?
A. DESpassword()
B. userencrypt()
C. passwordin()
D. pwdencrypt()
Carl just purchased an expensive smart phone to use for personal and business use. Carl wants to protect his investment so he decides to register the unique GSM number of the phone in case it is ever stolen. Which number should he have registered?
A. SIM card serial number
B. 15-digit IMEI number
C. Phone manufacturer's serial number
D. Device's phone number with country and area code
What is defined as the practice of using selected process techniques to improve the quality of a software development effort?
A. Software coding
B. Systems life-cycle engineering
C. Software engineering
D. Business systems analysis
What will the following ASP script accomplish on a webpage?
<%
Response.CacheControl = "no-cache"
Response.AddHeader "Pragma", "no-cache"
Response.Expires = -1
if session("UID")="" then
Response.Redirect "Logon.asp"
Response.End
end if
%>
A. Redirect users to the logon page if they do not have a valid certificate
B. Logged on users will timeout after hour
C. Checks whether user has already logged on
D. Checks the user's cache for personal information
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-92 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.