100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C836 WGU Study Review with Complete Solutions

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
20-07-2025
Written in
2024/2025

bounds checking - ANSWER -to set a limit on the amount of data we expect to receive to set aside storage for that data *required in most programming languages * prevents buffer overflows race conditions - ANSWER -A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions input validation - ANSWER -a type of attack that can occur when we fail to validate the input to our applications or take steps to filter out unexpected or undesirable content format string attack - ANSWER -a type of input validation attacks in which certain print functions within a programming language can be used

Show more Read less
Institution
C836 WGU
Course
C836 WGU










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836 WGU
Course
C836 WGU

Document information

Uploaded on
July 20, 2025
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C836 WGU Study Review with Complete Solutions
bounds checking - ANSWER -to set a of attack that can occur when we fail to
limit on the amount of data we expect to properly design our security mechanisms
receive to set aside storage for that data when implementing cryptographic controls in
*required in most programming languages our applications
* prevents buffer overflows

client-side attack - ANSWER -A type of
race conditions - ANSWER -A type of attack that takes advantage of weaknesses in
software development vulnerability that the software loaded on client machines or
occurs when multiple processes or multiple one that uses social engineering techniques
threads within a process control or share to trick us into going along with the attack
access to a particular resource, and the
correct handling of that resource depends on
the proper ordering or timing of transactions XSS (Cross Site Scripting) - ANSWER -
an attack carried out by placing code in the
form of a scripting language into a web page
input validation - ANSWER -a type of or other media that is interpreted by a client
attack that can occur when we fail to validate browser
the input to our applications or take steps to
filter out unexpected or undesirable content
XSRF (cross-site request forgery) -
ANSWER -an attack in which the
format string attack - ANSWER -a type attacker places a link on a web page in such a
of input validation attacks in which certain way that it will be automatically executed to
print functions within a programming initiate a particular activity on another web
language can be used to manipulate or view page or application where the user is
the internal memory of an application currently authenticated


authentication attack - ANSWER -A SQL Injection Attack - ANSWER -
type of attack that can occur when we fail to Attacks against a web site that take
use strong authentication mechanisms for advantage of vulnerabilities in poorly coded
our applications SQL (a standard and common database
software application) applications in order to
introduce malicious program code into a
authorization attack - ANSWER -A type company's systems and networks.
of attack that can occur when we fail to use
authorization best practices for our
applications clickjacking - ANSWER -An attack that
takes advantage of the graphical display
capabilities of our browser to trick us into
cryptographic attack - ANSWER -A type clicking on something we might not otherwise


, C836 WGU Study Review with Complete Solutions
to gain access to resources that the user
normally would be restricted from accessing.
server-side attack - ANSWER -A type of * via SQL injection or local issues
attack on the web server that can target
vulnerabilities such as lack of input
validation, improper or inadequate validating user inputs - ANSWER -a
permissions, or extraneous files left on the security best practice for all software
server from the development process * the most effective way of mitigating SQL
injection attacks

Protocol issues, unauthenticated access,
arbitrary code execution, and privilege Nikto (and Wikto) - ANSWER -A web
escalation - ANSWER -Name the 4 server analysis tool that performs checks for
main categories of database security issues many common server-side vulnerabilities &
creates an index of all the files and directories
it can see on the target web server (a process
web application analysis tool - known as spidering)
ANSWER -A type of tool that analyzes
web pages or web-based applications and
searches for common flaws such as XSS or burp suite - ANSWER -A well-known
SQL injection flaws, and improperly set GUI web analysis tool that offers a free and
permissions, extraneous files, outdated professional version; the pro version includes
software versions, and many more such advanced tools for conducting more in-depth
items attacks


protocol issues - ANSWER - fuzzer - ANSWER -A type of tool that
unauthenticated flaws in network protocols, works by bombarding our applications with
authenticated flaws in network protocols, all manner of data and inputs from a wide
flaws in authentication protocols variety of sources, in the hope that we can
cause the application to fail or to perform in
unexpected ways
arbitrary code execution - ANSWER -An
attack that exploits an applications
vulnerability into allowing the attacker to MiniFuzz File Fuzzer - ANSWER -A tool
execute commands on a user's computer. developed by Microsoft to find flaws in file-
* arbitrary code execution in intrinsic or handling source code
securable SQL elements

BinScope Binary Analyzer - ANSWER -A
Privilege Escalation - ANSWER -An tool developed by Microsoft to examine
attack that exploits a vulnerability in software source code for general good practices


, C836 WGU Study Review with Complete Solutions
stuxnet - ANSWER -A particularly
complex and impactful item of malware that
SDL Regex Fuzzer - ANSWER -A tool targeted the Supervisory Control and Data
developed by Microsoft for testing certain Acquisition (SCADA) systems that run various
pattern-matching expressions for potential industrial processes; this piece of malware
vulnerabilities raised the bar for malware from largely being
a virtual-based attack to actually being
physically destructive
good sources of secure coding guidelines -
ANSWER -CERT, NIST 800, BSI, an
organization's internal coding guidelines anti-malware tool - ANSWER -A type of
tool that uses signature matching or anomaly
detection (heuristics) to detect malware
OS hardening - ANSWER -the process threats, either in real-time or by performing
of reducing the number of available avenues scans of files and processes
through which our OS might be attacked

heuristics - ANSWER -the process of
attack surface - ANSWER -The total of anomaly detection used by anti-malware
the areas through which our operating tools to detect malware without signatures
system might be attacked

executable space protection -
6 main hardening categories - ANSWER -A hardware and software-
ANSWER -1. Removing unnecessary based technology that prevents certain
software portions of the memory used by the operating
2. Removing or turning off unessential system and applications from being used to
services execute code
3. Making alterations to common accounts
4. Applying the principle of least privilege
5. Applying software updates in a timely buffer overflow (overrun) - ANSWER -
manner The act of inputting more data than an
6. Making use of logging and auditing application is expecting from a particular
functions input, creating the possibility of executing
commands by specifically crafting the excess
data
Principle of Least Privilege - ANSWER -
states we should only allow a party the
absolute minimum permission needed for it ASLR (Address Space Layout Randomization)
to carry out its function - ANSWER -a security method that
involves shifting the contents of memory
around to make tampering difficult

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MERCYTRISHIA Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
180
Member since
1 year
Number of followers
35
Documents
10792
Last sold
4 hours ago
MercyTrishia

On this page, you find all documents, package deals offered by seller MercyTrishia

3.8

37 reviews

5
16
4
7
3
10
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions