ECCouncil 312-50 - Certified Ethical Hacker Exam
Which of the following programming languages is most vulnerable to buffer overflow attacks?
A developer for a company is tasked with creating a program that will allow customers to update their billing and shipping information. The billing address field used is limited to 50 characters. What pseudo code would the developer use to avoid a buffer overflow attack on the billing address field?
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
Smart cards use which protocol to transfer the certificate in a secure manner?
What is the main disadvantage of the scripting languages as opposed to compiled programming languages?
Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
How can a policy help improve an employee's security awareness?
Which of the following guidelines or standards is associated with the credit card industry?
Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?
Which type of security document is written with specific step-by-step details?