100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D385 OA Prep | Questions & verified and Correct Answers |Already Graded A+ 2025/26 Update | 100% Correct

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
08-10-2025
Written in
2025/2026

WGU D385 OA Prep | Questions & verified and Correct Answers |Already Graded A+ 2025/26 Update | 100% Correct What is the primary defense against log injection attacks? - ANSWER Sanitize outbound log messages An attacker exploits a cross-site scripting vulnerability. What is the attacker able to do? - ANSWER Access the user's data Which method is used for a SQL injection attack? - ANSWER Exploiting query parameters Maslow's Growth Needs - ANSWER Cognitive, Aesthetic, Self-Actualization, Transcendence Maslow's Physiological Need - ANSWER Biological needs for survival, food, water, shelter Maslow's Safety Need - ANSWER Protection from the elements, law and order, financial security, and freedom from fear. Maslow's Love and Belonging Need - ANSWER Need for interpersonal relationships - friendships, intimacy, being part of a group. Maslow's Esteem Need - ANSWER Self-respect, respect from others, achievement, status, and prestige. Maslow's Cognitive Need - ANSWER Curiosity, knowledge, and intellectual exploration Maslow's Aesthetic Need - ANSWER Need focuses on the search for and expression of beauty and balance. Maslow's Self-Actualization Need - ANSWER Personal growth and fulfillment and the realization of one's personal potential as a human being. Maslow's Transcendence Need - ANSWER Meeting spiritual needs or helping others achieve self-actualization. Arnold Gesell - ANSWER First theorist to observe and document stages of physical development. Gesell's Maturational Theory - ANSWER Child's growth & development are influenced by both their environment and genes in sequential order Infancy - ANSWER The stage of development that begins at birth and lasts between 18 and 24 months. Dozens of motor skills are added. Early Childhood - ANSWER The stage of development from 2 - 6 years old. Improvements occur in both fine and gross motor skills. Middle Childhood - ANSWER The stage of development from 6 - 10 years old. Slow but steady gains in weight and height. Adolescence - ANSWER The stage of development from 10 - 18 years old. Weight and height increase rapidly and puberty begins. Jean Piaget - ANSWER Swiss psychologist known for his Theory of Cognitive Development. Formal Operational Stage - ANSWER Stage of development for 12 years and up. Abstract thought begins. Higher order thinking and ability to systematically plan for future. Schema - ANSWER Categories of knowledge that help us to interpret and understand the world. An organized pattern of behavior or thought. Assimilation - ANSWER Process of using or transforming the environment so that it can be placed in preexisting cognitive structures (schema). Accomodation - ANSWER Process of changing cognitive structures (schema) in order to accept something from the environment. Can also develop new schemas. Equilibration - ANSWER The attempt to strike a balance between assimilation and accommodation. The tendency to organize schemas. Vygotsky's Theory of Cognitive Development - ANSWER Lev Vygotsky's sociocultural theory that emphasized the important role of social interactions in the development of children's cognition. Zone of Proximal Development (ZPD) - ANSWER The place where the most sensitive instruction or guidance should be given. It is the link between what we can do and what we can't do. More Knowledgeable Other (MKO) - ANSWER Someone who has a better understanding or a higher ability level than the learner. Vygotsky's Social Approach to Language Development - ANSWER Language develops through social interactions. Bandura's Social Learning Theory - ANSWER Learning occurs through observation and modeling. 3 Types of Modeling - ANSWER Live models, direct instruction, and symbolic instruction. Carol Gilligan's Theory of Gender and Moral Development - ANSWER Based her work on Kohlberg's theories, but states gender might influence ethical development. Ethics of Care - ANSWER Women's moral and ethical decisions often focus on way decisions will affect people and relationships. Kohlberg's Theory of Moral Development - ANSWER Moral development takes place in stages. Preconventional Stage - ANSWER Moral development stage where your behavior is influenced by rewards and punishments Conventional Stage - ANSWER Moral development stage where your behavior is influenced by peer pressure/society Postconventional Stage - ANSWER Moral development stage where your behavior is influenced by your own ethics Erikson's Stages of Psychosocial Development - ANSWER 8 stages of identify development where people are motivated by the need to achieve competence in certain areas of their lives. Piaget's Theory of Cognitive Development - ANSWER Theory that suggests children move through four different stages of development. Sensorimotor, Preoperational, Concrete Operational, and Formal Operational. Sensorimotor Stage - ANSWER Stage of development from birth to 2 years. Infants and toddlers acquire knowledge through sensory experiences and manipulating objects. Object Permanence - ANSWER The understanding that objects continue to exist even when they cannot be seen. Major development of sensorimotor stage. Preoperational Stage - ANSWER Stage of development from 2 to 7 years. Kids learn through pretend play. Egocentric and struggle to see others perspective. Concrete Operational Stage - ANSWER Stage of development from 7 to 11 years. Logical thought begins, and they understand the idea of conservation. Status 403 code - ANSWER Forbidden Access not granted based on supplied credentials Status code 403 is common when? - ANSWER NO HEADER is provided in the GET request python length function - ANSWER The len() function in Python returns the number of items in an object. The object can be a sequence (such as a string, tuple, or list) or a collection (such as a dictionary or set Status code 201 - ANSWER - Created - your request was accepted and the resource was created Two common defensive coding techniques - ANSWER check functional preconditions and postconditions Defensive Coding Techniques - ANSWER a proactive approach to software development that focuses on anticipating and handling potential issues before they occur, improving the robustness and stability of the application. It involves implementing safeguards, like input validation and error handling, to prevent bugs, crashes, and vulnerabilities Best way to ensure API is protected against privilege escalation - ANSWER implement resource and field-level access control Privilege Escalation - ANSWER a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications Broken Object Level Authorization - ANSWER a security vulnerability where an application fails to properly verify a user's permissions to access specific data objects, allowing unauthorized access or manipulation of data Python type() function - ANSWER check the data type of the input. isinstance() - ANSWER A more robust way to check if an object is an instance of a particular class or a tuple of classes (allowing for inheritance) isdigit() - ANSWER Checks if a string consists only of digits isalpha() - ANSWER Checks if a string consists only of alphabetic characters isalnum() - ANSWER Checks if a string consists only of alphanumeric characters startswith(), endswith() - ANSWER Check if a string starts or ends with a specific substring len() - ANSWER Checks the length of a string strip(), lstrip(), rstrip( - ANSWER Remove leading/trailing whitespace Conditional Statements - ANSWER if, elif, else Exception Handling - ANSWER try, except assertions - ANSWER "Statements used to test assumptions about your code. Contain conditional checking and an optional error message that is displayed if the condition is False." Null special value in Python - ANSWER NONE 401 vs 403 - ANSWER Authentication vs authorization 401: focuses on invalid or missing authentication credentials. 403: pertains to valid authentication but inadequate authorization which protocol caches a token after it has been acquired - ANSWER MSAL, Microsoft Authentication Library What does cross-origin resource sharing (CORS) allow users to do? - ANSWER Override same starting policy for specific resources Which protocol caches a token after it has been acquired? - ANSWER MSAL Which response method, when sent a request, returns information about the server's response and is delivered back to the console? - ANSWER nt Status Codes - ANSWER - 200 = OK - 201 = CREATED - 400 = BAD REQUEST - 401 = UNAUTHORIZED - 403 = FORBIDDEN - 404 = NOT FOUND - 405 = METHOD NOT ALLOWED - 500 = INTERNAL SERVER ERROR What is best for input validation? - ANSWER type(): The type() function is used to determine the type of an object. While it's not typically used for input validation directly, it can be used to check the type of user input to ensure it matches the expected data type (e.g., checking if an input is an integer or a string). Prevent log injection - ANSWER validate() A user masquerades as other users, what type of attack was used? - ANSWER Cross Site Scripting What is returned when using nt - ANSWER returns the raw binary content of the HTTP response as bytes. What can an attacker do with a log injection attack - ANSWER Injection of commands a parser can execute Which software testing relies on using old test cases? - ANSWER Regression testing When should regression testing be conducted? - ANSWER After some code changes Access Control Allow Origin- client request to (server) , what does server send back? - ANSWER ACAO Which Python function is prone to a potential code injection attack? - ANSWER eval() What are two common defensive coding techniques? - ANSWER Check functional and preconditions and postconditions Which package is meant for internal use by Python for regression testing? - ANSWER test A security analyst has noticed a vulnerability in which an attacker took over multiple users' accounts. Which vulnerability did the security analyst encounter? - ANSWER Broken access control When creating a new user, an administrator must submit the following fields to an API endpoint: Name Email Address Password IsAdmin What is the best way to ensure the API is protected against privilege escalation? - ANSWER Implement resource and field-level access control What is the primary defense against log injection attacks? - ANSWER Sanitize outbound log messages Uses the same key for encryption and decryption. Hash - ANSWER One-way Encryption function. Transforms input of any size into a fixed-size output Cross-site scripting - ANSWER Security vulnerability. Attacker injects malicious scripts into websites viewed by other users. Scripts execute in the victim's browser. Can steal cookies, redirect users, deface sites, etc. Often targets input fields that aren't properly sanitized. Prevention: Input sanitization, output encoding, Content Security Policy (CSP). Deserialization - ANSWER Process of converting data from a serialized format (e.g., JSON, XML, Pickle) back into an object or data structure in memory. Security risk if untrusted data is deserialized without proper validation. Validate and sanitize serialized data, avoid deserializing untrusted sources, use safer serialization formats.

Show more Read less
Institution
WGU D385
Course
WGU D385











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D385
Course
WGU D385

Document information

Uploaded on
October 8, 2025
Number of pages
35
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU D385 OA Prep | Questions & verified and
Correct Answers |Already Graded A+ 2025/26 Update
| 100% Correct

What is the primary defense against log injection attacks? - ANSWER Sanitize
outbound log messages


An attacker exploits a cross-site scripting vulnerability. What is the attacker able
to do? - ANSWER Access the user's data
Which method is used for a SQL injection attack? - ANSWER Exploiting query
parameters
Maslow's Growth Needs - ANSWER Cognitive, Aesthetic, Self-Actualization,
Transcendence


Maslow's Physiological Need - ANSWER Biological needs for survival, food,
water, shelter


Maslow's Safety Need - ANSWER Protection from the elements, law and order,
financial security, and freedom from fear.


Maslow's Love and Belonging Need - ANSWER Need for interpersonal
relationships - friendships, intimacy, being part of a group.


Maslow's Esteem Need - ANSWER Self-respect, respect from others,
achievement, status, and prestige.

, Maslow's Cognitive Need - ANSWER Curiosity, knowledge, and intellectual
exploration


Maslow's Aesthetic Need - ANSWER Need focuses on the search for and
expression of beauty and balance.


Maslow's Self-Actualization Need - ANSWER Personal growth and fulfillment
and the realization of one's personal potential as a human being.


Maslow's Transcendence Need - ANSWER Meeting spiritual needs or helping
others achieve self-actualization.


Arnold Gesell - ANSWER First theorist to observe and document stages of
physical development.


Gesell's Maturational Theory - ANSWER Child's growth & development are
influenced by both their environment and genes in sequential order


Infancy - ANSWER The stage of development that begins at birth and lasts
between 18 and 24 months. Dozens of motor skills are added.


Early Childhood - ANSWER The stage of development from 2 - 6 years old.
Improvements occur in both fine and gross motor skills.


Middle Childhood - ANSWER The stage of development from 6 - 10 years old.
Slow but steady gains in weight and height.

,Adolescence - ANSWER The stage of development from 10 - 18 years old.
Weight and height increase rapidly and puberty begins.


Jean Piaget - ANSWER Swiss psychologist known for his Theory of Cognitive
Development.




Formal Operational Stage - ANSWER Stage of development for 12 years and up.
Abstract thought begins. Higher order thinking and ability to systematically plan
for future.


Schema - ANSWER Categories of knowledge that help us to interpret and
understand the world. An organized pattern of behavior or thought.


Assimilation - ANSWER Process of using or transforming the environment so that
it can be placed in preexisting cognitive structures (schema).


Accomodation - ANSWER Process of changing cognitive structures (schema) in
order to accept something from the environment. Can also develop new schemas.


Equilibration - ANSWER The attempt to strike a balance between assimilation
and accommodation. The tendency to organize schemas.


Vygotsky's Theory of Cognitive Development - ANSWER Lev Vygotsky's
sociocultural theory that emphasized the important role of social interactions in the
development of children's cognition.

, Zone of Proximal Development (ZPD) - ANSWER The place where the most
sensitive instruction or guidance should be given. It is the link between what we
can do and what we can't do.


More Knowledgeable Other (MKO) - ANSWER Someone who has a better
understanding or a higher ability level than the learner.


Vygotsky's Social Approach to Language Development - ANSWER Language
develops through social interactions.


Bandura's Social Learning Theory - ANSWER Learning occurs through
observation and modeling.


3 Types of Modeling - ANSWER Live models, direct instruction, and symbolic
instruction.


Carol Gilligan's Theory of Gender and Moral Development - ANSWER Based her
work on Kohlberg's theories, but states gender might influence ethical
development.


Ethics of Care - ANSWER Women's moral and ethical decisions often focus on
way decisions will affect people and relationships.


Kohlberg's Theory of Moral Development - ANSWER Moral development takes
place in stages.


Preconventional Stage - ANSWER Moral development stage where your behavior
is influenced by rewards and punishments
$21.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
munywokikatinda

Get to know the seller

Seller avatar
munywokikatinda Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
11 months
Number of followers
0
Documents
50
Last sold
-
Professional academic hub

You will get solutions to all subjects in both assignments and major exams. Contact me for any assistance. Good luck! Simple, well-researched education material for you. Expertise in nursing, mathematics, psychology, biology, etc. My Work contains the latest, updated Exam Solutions, study guides, and notes. 100% verified Guarantee

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions