100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C706 Secure Software Design Exam (Latest 2023/ 2024 Update) | Questions and Verified Answers| 100% Correct| Grade A

Rating
-
Sold
-
Pages
53
Grade
A+
Uploaded on
04-12-2023
Written in
2023/2024

WGU C706 Secure Software Design Exam (Latest 2023/ 2024 Update) | Questions and Verified Answers| 100% Correct| Grade A Q: A hacker has used a design flaw in an application to obtain unauthorized access to the application. Which type of attack has occurred? A buffer overflow B backdoor C escalation of privileges D maintenance hook Answer: C Q: During the recent development of a new application, the customer requested a change. You must implement this change according to the change control process. What is the first step you should implement? A Analyze the change request. B Submit the change results to the management. C Acquire management approval. D Record the change request. Answer: A Q: Which interface language is an application programming interface (API) that can be configured to allow any application to query databases? A JDBC B XML C OLE DB D ODBC Answer: D Q: Which type of channel is used when one process writes data to a hard drive and another process reads it? A covert storage channel B overt storage channel C overt timing channel D covert timing channel Answer: A Q: Which type of malicious attack uses Visual Basic scripting? A dumpster diving attack B denial of service attack C Trojan horse attack D social engineering attack Answer: C Q: All of the following are countermeasures for session management attacks, EXCEPT: A Implement pre- and post-validation controls. B Encrypt cookies that include information about the state of the connection. C Implement time stamps or time-based validation. D Implement randomized session IDs. Answer: A Q: Which tool assists in application development design layout as a part of application development life cycle? A Aggregation B Delphi C Spiral D CASE Answer: D Q: What is a characteristic of maintaining logs in a system? A Logging provides access control by authenticating user credentials. B Logging helps an administrator to detect security breaches and vulnerable points in a network. C Logging provides audit trails but enhances security violations. D Logging prevents security violations but only deals with passive monitoring. Answer: B Q: Your company has purchased an expert system that uses if-then-else reasoning to obtain more data than is currently available. Which expert system processing technique is being implemented? A forward-chaining technique B backward-chaining technique C waterfall model D spiral model Answer: A Q: Which type of malicious code is hidden inside an otherwise benign program when the program is written? A worm B logic bomb C Trojan horse D virus Answer: C Q: Which statement is true of a software development life cycle? A Parallel testing verifies whether more than one system is available for redundancy. B A software programmer should be the only person to develop the software, test it, and submit it to production C Unit testing should be performed by the developer and the quality assurance team. D Workload testing should be performed while designing the functional requirements. Answer: C Q: Your organization has several diskless computer kiosks that boot via optical media located in the office lobby. Recently, users reported that the diskless computers have been infected with a virus. What should you do to ensure the virus is removed? A Launch an anti-virus program on the diskless computers via a USB flash drive. B Remotely launch an anti-virus program on the diskless computers. C Reboot the server to which the diskless computers connect. D Reboot the diskless computers. Answer: D

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 4, 2023
Number of pages
53
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • your organization has

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nurse_steph Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
9411
Member since
5 year
Number of followers
5142
Documents
7610
Last sold
13 hours ago
Exams, Study guides, Reviews, Notes

All study solutions.

3.9

1688 reviews

5
849
4
297
3
261
2
79
1
202

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions