Yancey has just finished downloading the Valgrind suite to use in his application development. Yancey is most concerned about the possibility of memory-management issues in his programs. What tool included in Valgrind suite can Yancey use to detect memory-management related issues?
A. Massif
B. MemoryGuard
C. Cachegrind
D. Memcheck
正解:D
質問 2:
Paul wants to capture audit information on PLSQL so he executes the following command:
sqlplus "sys / as sysdba"
Enter password: password123!!!!
SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS
SCOPE=SPFILE;
SQL> SHUTDOWN NORMAL;
SQL> STARTUP;
What privileges has Paul logged on with?
A. SYSDBA
B. Root
C. SYS
D. ADMIN
正解:A
質問 3:
Megan has just build a new kernel using the command make bzImage. Where can Megan go now to see the newly created kernel?
A. /boot/mynewkernel/bzImage
B. /etc/dev/boot/bzImage
C. /etc/lino.conf
D. /usr/src/linux/arch/i386/boot/bzImage
正解:D
質問 4:
Harold is programming an application that needs to be incorporate data encryption. Harold decides to utilize an encryption algorithm that uses 4-bit working registers instead of the usual 2-bit working registers. What encryption algorithm has Harold decided to use?
A. Blowfish
B. RC4
C. RC5
D. RC6
正解:D
質問 5:
Harold is developing software for the company he works for to aid in their human resources and payroll procedures. Harold is almost done working on the program, currently working in the testing phase. Since Harold's supervisors and the company executives are going to consider this a mission critical program, they want it to be tested to the fullest. Harold decides to test the program using higher than normal simulated loads and requests. What type of testing is Harold performing against his program?
A. Load test
B. Load-pressure test
C. Stress test
D. User acceptance test
正解:C
質問 6:
Kenny is the CIO for Fredrickson Entertainment, a gaming software company in Omaha.
The developers in Kenny's company have just finished creating a 3D first person shooter game that will be released to the market within the next couple of months. Kenny is trying to decide what type of license or activation code structure they should use for the game to prevent piracy and protect their product. Kenny decides to go with an approach that will allow each sold copy to be activated online up to five times because he knows his users might have multiple PCs or might need to reinstall the product at some point.
What type of activation policy has Kenny decided to go with?
A. Strict license terms enforced
B. Monitor only mode
C. License terms enforced - fair use
D. Loose license enforced - reasonable use
正解:D
質問 7:
Lori is creating a login page using Java on one of her websites with the following code.
What vulnerability or issue is the code susceptible to?
conn = pool.getConnection();
String sql = "select * from user where
username='" + "' and password='" + password +
"'";
stmt = conn.createstatement();
rs = stmt.executeQuery(sql);
if (rs.next())
{
loggedIn = true;
out.println("Successfully logged in");
}
else
{
out.println("Username and/or password not valid");
}
A. SQL injection
B. SQL slamming
C. Directory transversal
D. Query string manipulation
正解:A
質問 8:
Carl just purchased an expensive smart phone to use for personal and business use. Carl wants to protect his investment so he decides to register the unique GSM number of the phone in case it is ever stolen. Which number should he have registered?
A. SIM card serial number
B. Phone manufacturer's serial number
C. 15-digit IMEI number
D. Device's phone number with country and area code
正解:C
質問 9:
Which Linux command will securely delete a file by overwriting its contents?
A. del -rm
B. Shred
C. rm -rf /
D. ps -rm
正解:B
Miki -
前にも312-76の問題集を購入して合格したので、今回の312-92試験もEC-COUNCILさんに頼りたいと思ってまたここに購入した。結果はもちろん合格だよぉーん。これからもお世話になります。