100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D385 - Software and Security Testing WGU Questions & Answers

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
24-03-2025
Written in
2024/2025

What hash function should you use for most general purpose cryptographic hashing? - SHA-256 What hash function should you consider using for high security environments, though it may have less support? - SHA3-256 What hash function should you use for very large messages? - BLAKE2 What two hash functions should you avoid, as they're now considered unsecure? - MD5 and SHA1 What is the difference between hash functions and checksum functions? - Hash functions have stronger collision resistance, checksums are faster. Checksums are not useful for security. What module do you use for cryptographic hashing in Python? - hashlib What 3 properties characterize hash functions? - 1. Deterministic behavior 2. Fixed-length hash values 3. Avalanche effect

Show more Read less
Institution
D385
Course
D385









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D385
Course
D385

Document information

Uploaded on
March 24, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D385 - Software and Security Testing WGU Questions &
Answers
What hash function should you use for most general purpose cryptographic hashing? - ✔✔✔SHA-256



What hash function should you consider using for high security environments, though it may have less
support? - ✔✔✔SHA3-256



What hash function should you use for very large messages? - ✔✔✔BLAKE2



What two hash functions should you avoid, as they're now considered unsecure? - ✔✔✔MD5 and SHA1



What is the difference between hash functions and checksum functions? - ✔✔✔Hash functions have
stronger collision resistance, checksums are faster. Checksums are not useful for security.



What module do you use for cryptographic hashing in Python? - ✔✔✔hashlib



What 3 properties characterize hash functions? - ✔✔✔1. Deterministic behavior 2. Fixed-length hash
values 3. Avalanche effect



What is the logging numeric value for DEBUG? - ✔✔✔10



What does logging.DEBUG indicate? - ✔✔✔Detailed information, typically only of interest to a
developer trying to diagnose a problem.



What is the logging numeric value for INFO? - ✔✔✔20



What does logging.INFO indicate? - ✔✔✔Confirmation that things are working as expected



What is the logging numeric value for WARNING? - ✔✔✔30

, What does logging.WARNING indicate? - ✔✔✔Something unexpected happened, or that a problem
might occur in the near future. Software is still working as expected.



What is the logging numeric value for ERROR? - ✔✔✔40



What does logging.ERROR indicate? - ✔✔✔Software has not been able to perform some function due to
a more serious problem.



What is the logging numeric value for CRITICAL? - ✔✔✔50



What does logging.CRITICAL indicate? - ✔✔✔A serious error, indicating that the program itself may be
unable to continue running.



Should you use the secrets or random module for generating secure random numbers? - ✔✔✔secrets



What do keyed hash functions do? - ✔✔✔Hash functions using different keys produce different hash
values of the same message. Hash functions using the same key produce matching hash values of the
same message. Ensures data authentication.



What are HMAC functions? - ✔✔✔A generic way to use any ordinary hash function as though it were a
keyed hash function, since most hash functions don't support keys natively. Takes 3 inputs: message,
key, ordinary cryptographic hash function.



What is a timing attack? - ✔✔✔Attacker obtains hints about private information by measuring the time
a system takes to perform an operation (ex: string comparison)



How can you avoid a timing attack with the hmac module? - ✔✔✔You can use compare_digest in place
of ==. This always compares all characters before it returns thus preventing timing attack vulnerabilities.



What is a side channel attack? - ✔✔✔Derives unauthorized information by measuring any physical side
channel (such as time sound, power consumption, electromagnetic radiation, radio waves, and heat)
$7.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
RISEPREP

Get to know the seller

Seller avatar
RISEPREP Oxford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
1
Documents
354
Last sold
1 month ago
Get Quality of Document

Hello I'm a passionate and experienced online tutor. I offer support to help students succeed. you can access study materials, notes, and guides to help you excel academically I am hear to help you. review so as to know the quality of service offered & to better improve your expirience. thank you and welcome back. BONUS! BONUS! BONUS! For every student you refer to me with an order that is completed and paid transparently, I will give you one free study document you need or do one assignment for you, free of charge!Thank you Very much for the purchase Kindly leave a Review to help know the Quality of Document and those who have reviewed thanks again

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions