Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU C836 WITH COMPLETE SOLUTIONS 100% VERIFIED!!

Puntuación
-
Vendido
-
Páginas
26
Grado
A+
Subido en
28-01-2025
Escrito en
2024/2025

WGU C836 WITH COMPLETE SOLUTIONS 100% VERIFIED!!...

Institución
WGU C836
Grado
WGU C836

Vista previa del contenido

WGU C836 WITH COMPLETE SOLUTIONS 100% VERIFIED!!



bounds checking ANSWER>>to set a limit on the amount of data we expect to receive
to set aside storage for that data

*required in most programming languages

* prevents buffer overflows



race conditions A software development vulnerability which involves multiple
processes, or threads within a process that controls or shares access to a particular
resource where the correct handling of that resource depends on proper ordering or
timing of transactions



input validation - ANSWER>> A type of attack that can happen when we don't validate
the input against our applications or failing to filter unexpected or undesirable content.



format string attack - ANSWER>> A class of input validation attacks where a variety of
print functions inside of a programming language can be leveraged to exploit or view the
internal memory of an application



Authentication attack - ANSWER>>A type of attack that may happen when we fail to use
strong authentication mechanisms for our applications



Authorization attack - ANSWER>>A type of attack that may happen when we fail to use
authorization best practices for our applications



Cryptographic attack - ANSWER>>A type of attack that may happen when we fail to
properly design our security mechanisms while implementing cryptographic controls in
our applications



client-side attack An attack that exploits vulnerabilities in the software loaded on client
machines or one that relies on social engineering to convince us to collaborate in the

,attack



XSS (Cross Site Scripting) an attack that consists of embedding code, typically in the
form of a scripting language, in a web page or other media that will be interpreted by a
client browser



XSRF (cross-site request forgery)- ANSWER>>an attack in which an attacker places on a
web page in such a way that its execution is launched automatically, without the
knowledge and/or consent of that user, but with the possibility of initiating a certain type
of activity to another web or application where the user was currently authenticated



clickjacking - ANSWER>>An attack that leverages the graphical display capabilities of
our browser in order to dupe us into clicking on something we would not normally do.



server-side attack - ANSWER>>A form of attack targeting the web server, for example:
not validating input or using improper or inadequate permissions, or files left on from
the development process



Database security issues include protocol issues, unauthenticated access, arbitrary
code execution and privilege escalation - ANSWER>>Name the 4 main categories of
database security issues



web application analysis tool - ANSWER>>A type of tool that analyzes web pages or
web-based applications and searches for common flaws such as XSS or SQL injection
flaws, and improperly set permissions, extraneous files, outdated software versions,
and many more such items



protocol flaws. ANSWER>>unauthenticated network protocol vulnerabilities,
authenticated network protocol vulnerabilities, authentication protocol weaknesses



arbitrary code execution ANSWER>>An attack, which exploits a vulnerability in the
application that can allow the attacker to run malicious commands in customer
computer.

, * arbitrary code execution in intrinsic or securable SQL elements



Privilege Escalation - ANSWER>> an attack that exploits a software vulnerability to
obtain access to resources that would normally be protected from the user

* via SQL injection or local issues

validating user inputs - ANSWER>>a software security best practice

* as a rule of thumb, this would be the best way of ensuring SQL injection may be
minimized or avoided completely



Nikto (and Wikto) a web server analysis tool that performs checks for many common
server-side vulnerabilities & creates an index of all the files and directories it can see on
the target web server-a process known as spidering.



Burp Suite a great GUI web analysis tool and this has a free and pro version; the pro
version contains advanced tools to conduct more in-depth attacks.



fuzzer - ANSWER>>A type of tool that works by bombarding our applications with all
manner of data and inputs from a wide variety of sources, in the hope that we can cause
the application to fail or to perform in unexpected ways



MiniFuzz File Fuzzer - ANSWER>>A tool developed by Microsoft to find flaws in
file-handling source code



BinScope Binary Analyzer - ANSWER>>A tool provided by Microsoft to analyze source
code for general good practices



SDL Regex Fuzzer - ANSWER>>A tool provided by Microsoft for fuzz-testing certain
pattern-matching expressions for possible vulnerabilities

good sources of secure coding guidelines - ANSWER>>CERT, NIST 800, BSI, an
organization's internal coding guidelines

Escuela, estudio y materia

Institución
WGU C836
Grado
WGU C836

Información del documento

Subido en
28 de enero de 2025
Número de páginas
26
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

  • wgu c836
$18.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF


Documento también disponible en un lote

Thumbnail
Package deal
WGU C836 PACKAGED EXAMS!!
-
2 2025
$ 36.98 Más información

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Stetson Liberty University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
62
Miembro desde
3 año
Número de seguidores
41
Documentos
2448
Última venta
3 semanas hace

4.6

19 reseñas

5
13
4
4
3
2
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes