100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D395 ITEC 2034 Software Security & Testing- Objective Assessment - WGU 2025.

Rating
-
Sold
-
Pages
35
Uploaded on
28-05-2025
Written in
2024/2025

D395 ITEC 2034 Software Security & Testing- Objective Assessment - WGU 2025.D395 ITEC 2034 Software Security & Testing- Objective Assessment - WGU 2025.D395 ITEC 2034 Software Security & Testing- Objective Assessment - WGU 2025.












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 28, 2025
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

D385 ITEC 2034 Software Security &
Testing

Objective Assessment Review

(Questions & Solutions)

2025




©2025

, Question 1
A development team is tasked with simulating a real-world cyber attack
against a web application to evaluate its defense mechanisms. Which
approach best describes a “Red Team” exercise?
- A. Running automated vulnerability scans daily
- B. Conducting white‑box testing using source code analysis
- C. Orchestrating a covert, multi‑vector attack that includes social
engineering, exploit attempts, and lateral movements
- D. Executing a standard penetration test using off‑the‑shelf tools

ANS: C
Rationale: A Red Team exercise is an adversary simulation where
trained testers use multiple techniques (including social engineering and
covert exploits) to mimic a real attacker’s behavior, thereby providing a
realistic measure of the organization’s security posture.

---

Question 2
Which technique involves sending random, malformed, or unexpected
inputs to a software application to detect crashes, memory leaks, or
unhandled exceptions?
- A. Fuzz testing
- B. Unit testing
- C. Regression testing
- D. Stress testing

ANS: A
Rationale: Fuzz testing (or fuzzing) injects random or invalid input into
an application to trigger failures, uncovering security vulnerabilities such
as buffer overflows or input validation issues.

---
©2025

, Question 3
Static analysis in the context of software security primarily aims to:
- A. Execute the application to monitor its behavior under load
- B. Review the code without running it to identify potential
vulnerabilities
- C. Analyze network traffic generated by the application
- D. Simulate user interactions to test business logic

ANS: B
Rationale: Static analysis examines source code (or compiled code)
without executing it to detect defects, insecure coding practices, and
potential vulnerabilities early in the development life cycle.

---

Question 4
To mitigate SQL injection vulnerabilities in a Java-based web application,
which secure coding practice should be most rigorously applied?
- A. Using dynamic query concatenation based on user input
- B. Implementing input validation only on the client side
- C. Utilizing prepared statements with parameterized queries
- D. Relying on exception handling to catch injection attempts

ANS: C
Rationale: Prepared statements with parameterized queries bind
variables and separate SQL logic from the data, thereby effectively
preventing SQL injection attacks.

---

Question 5
During a security test of a web application, the QA team uses an
interception proxy to manipulate HTTP/HTTPS traffic. Which tool is most
commonly associated with this practice?
©2025

, - A. Selenium
- B. Burp Suite
- C. JMeter
- D. AppScan

ANS: B
Rationale: Burp Suite is widely used by security professionals to
intercept, modify, and analyze web traffic, making it a standard tool for
dynamic security testing and penetration testing.

---

Question 6
Which testing approach involves manually reviewing source code with
the goal of uncovering security flaws such as insecure APIs, improper
error handling, or lack of input sanitization?
- A. Automated regression testing
- B. Peer code review
- C. Dynamic analysis
- D. Load testing

ANS: B
Rationale: Peer code review is a manual process in which
knowledgeable developers scrutinize the source code to detect potential
security vulnerabilities and ensure compliance with secure coding
standards.

---

Question 7
A company adopts a methodology that incorporates security tests into
every phase of the development cycle—from code commit to production
deployment. This integrated approach is best described as:
- A. Ad hoc security testing
- B. DevSecOps
©2025

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EmilioOchieng Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
138
Member since
2 year
Number of followers
17
Documents
4024
Last sold
6 days ago

Hi there! I'm a former nursing student who loves to share my knowledge and experience with others. I have a collection of past study notes and papers for nursing and other programs that I sell at affordable prices. Whether you need help with anatomy, pharmacology, ethics, or anything else, I have something for you. My notes are clear, concise, and fun to read. They will make your learning easier and more enjoyable. Plus, you'll get to see some of my witty comments and jokes along the way. Trust me, you won't regret buying from me!

Read more Read less
4.0

22 reviews

5
11
4
5
3
3
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions