100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Comprehensive Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass!!Current Update!!

Rating
-
Sold
-
Pages
54
Grade
A+
Uploaded on
05-01-2026
Written in
2025/2026

WGU C836 Comprehensive Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass!!Current Update!! 1. Authentication attack - ANSWER A type of attack that can occur when we fail to use strong authentication mechanisms for our applications 2. Authorization attack - ANSWER A type of attack that can occur when we fail to use authorization best practices for our applications 3. Cryptographic attack - ANSWER A type of attack that can occur when we fail to properly design our security mechanisms when implementing cryptographic controls in our applications 4. Client-side attack - ANSWER A type of attack that takes advantage of weaknesses in the software loaded on client machines or one that uses social engineering techniques to trick us into going along with the attack 5. XSS (Cross Site Scripting) - ANSWER an attack carried out by placing code in the form of a scripting language into a web page or other media that is interpreted by a client browser 6. XSRF (cross-site request forgery) - ANSWER An attack in which the attacker places a link on a web page in such a way that it will be automatically executed to initiate a particular activity on another web page or application where the user is currently authenticated 7. SQL Injection Attack - ANSWER Attacks against a web site that take advantage of vulnerabilities in poorly coded SQL (a standard and common database software application) applications in order to introduce malicious program code into a company's systems and networks. 8. Clickjacking - ANSWER An attack that takes advantage of the graphical display capabilities of our browser to trick us into clicking on something we might not otherwise 9. Server-side attack - ANSWER A type of attack on the web server that can target vulnerabilities such as lack of input validation, improper or inadequate permissions, or extraneous files left on the server from the development process 10. Protocol issues, unauthenticated access, arbitrary code execution, and privilege escalation - ANSWER Name the 4 main categories of database security issues

Show more Read less
Institution
WGU C836
Course
WGU C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836
Course
WGU C836

Document information

Uploaded on
January 5, 2026
Number of pages
54
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C836 Comprehensive 2026-2027 Frequently
Tested Questions With ELABORATED 100% Correct
COMPLETE SOLUTIONS

Guaranteed Pass!!Current Update!!


1. Authentication attack - ANSWER A type of attack that can occur when
we fail to use strong authentication mechanisms for our applications



2. Authorization attack - ANSWER A type of attack that can occur when we
fail to use authorization best practices for our applications



3. Cryptographic attack - ANSWER A type of attack that can occur when we
fail to properly design our security mechanisms when implementing
cryptographic controls in our applications



4. Client-side attack - ANSWER A type of attack that takes advantage of
weaknesses in the software loaded on client machines or one that uses
social engineering techniques to trick us into going along with the attack



5. XSS (Cross Site Scripting) - ANSWER an attack carried out by placing
code in the form of a scripting language into a web page or other media
that is interpreted by a client browser

,6. XSRF (cross-site request forgery) - ANSWER an attack in which the
attacker places a link on a web page in such a way that it will be
automatically executed to initiate a particular activity on another web page
or application where the user is currently authenticated



7. SQL Injection Attack - ANSWER Attacks against a web site that take
advantage of vulnerabilities in poorly coded SQL (a standard and common
database software application) applications in order to introduce malicious
program code into a company's systems and networks.



8. Clickjacking - ANSWER An attack that takes advantage of the graphical
display capabilities of our browser to trick us into clicking on something we
might not otherwise



9. Server-side attack - ANSWER A type of attack on the web server that can
target vulnerabilities such as lack of input validation, improper or
inadequate permissions, or extraneous files left on the server from the
development process


10.Protocol issues, unauthenticated access, arbitrary code execution, and
privilege escalation - ANSWER Name the 4 main categories of database
security issues



11.web application analysis tool - ANSWER A type of tool that analyzes web
pages or web-based applications and searches for common flaws such as
XSS or SQL injection flaws, and improperly set permissions, extraneous files,
outdated software versions, and many more such items

,12.Protocol issues - ANSWER unauthenticated flaws in network protocols,
authenticated flaws in network protocols, flaws in authentication protocols



13.Arbitrary code execution - ANSWER An attack that exploits an
applications vulnerability into allowing the attacker to execute commands
on a user's computer.
• arbitrary code execution in intrinsic or securable SQL elements



14.Privilege Escalation - ANSWER An attack that exploits a vulnerability in
software to gain access to resources that the user normally would be
restricted from accessing.
• via SQL injection or local issues



15.Validating user inputs - ANSWER a security best practice for all software
• the most effective way of mitigating SQL injection attacks



16.Nikto (and Wikto) - ANSWER A web server analysis tool that performs
checks for many common server-side vulnerabilities & creates an index of
all the files and directories it can see on the target web server (a process
known as spidering)



17.Burp suite - ANSWER A well-known GUI web analysis tool that offers a
free and professional version; the pro version includes advanced tools for
conducting more in-depth attacks

, 18.Fuzzer - ANSWER A type of tool that works by bombarding our
applications with all manner of data and inputs from a wide variety of
sources, in the hope that we can cause the application to fail or to perform
in unexpected ways



19.MiniFuzz File Fuzzer - ANSWER A tool developed by Microsoft to find
flaws in file-handling source code



20.BinScope Binary Analyzer - ANSWER A tool developed by Microsoft to
examine source code for general good practices



21.SDL Regex Fuzzer - ANSWER A tool developed by Microsoft for testing
certain pattern-matching expressions for potential vulnerabilities



22.Good sources of secure coding guidelines - ANSWER CERT, NIST 800,
BSI, an organization's internal coding guidelines



23.OS hardening - ANSWER the process of reducing the number of
available avenues through which our OS might be attacked



24.Attack surface - ANSWER The total of the areas through which our
operating system might be attacked



25.6 main hardening categories - ANSWER 1. Removing unnecessary
software

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSINGDICTIONARY Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
246
Member since
2 year
Number of followers
87
Documents
2587
Last sold
5 days ago
NURSING ENCYCLOPEDIA

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
4.1

29 reviews

5
15
4
5
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions