100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D385: Logging and Security Issues UPDATED ACTUAL Questions and CORRECT Answers

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
09-11-2025
Written in
2025/2026

D385: Logging and Security Issues UPDATED ACTUAL Questions and CORRECT Answers

Institution
WGU D385
Course
WGU D385










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D385
Course
WGU D385

Document information

Uploaded on
November 9, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D385: Logging and Security Issues
UPDATED ACTUAL Questions and
CORRECT Answers
What are some common debugging techniques? - CORRECT ANSWER - - printing out
values of variables
- changing the state ("path") of the program to make it do different things
- stepping through the execution of a program line by line
- breakpoints
- trace points
- stopping the program at certain events
- viewing the output of a program in a debugger window


What are some Python debugging tools? - CORRECT ANSWER - - pdb: most commonly
used
- Web-PDB
- wdb
- Pyflame
- objgraph


XML External Entity Attacks - CORRECT ANSWER - - XXE
- when attackers exploit an XML parser to read arbitrary files on your server
- attackers might also be able to read config files, retrieve user information


Insecure Deserialization - CORRECT ANSWER - - serialization is the conversion of an
object in a programming language is saved into a format that can be saved to a database
- DEserialization is when a serialized object is read from a file or the network and converted
back into an object

,- INSECURE DESERIALIZATION occurs when an attacker can manipulate the serialized
object and achieve authentication bypass, DOS, or arbitrary code execution


Injection Attacks - CORRECT ANSWER - - when an application cannot properly
distinguish between untrusted user data and code
- typically allows for arbitrary code execution


SQL Injection Attack Mitigation - CORRECT ANSWER - - use parameterized statements



Log Injection Attack Mitigation - CORRECT ANSWER - - prefixing log entries with
meta-data (i.e. timestamp)
- validate the entry before accessing or opening


Sensitive Data Leaks - CORRECT ANSWER - - occurs when an application fails to
properly protect sensitive information
- this typically occurs through descriptive response headers, descriptive error messages with
stack traces or database error messages, or revealing comments in HTML files


Cross-site Request Forgery - CORRECT ANSWER - - client-side technique used to attack
other users of a web application
- attackers send HTTP requests that pretend to come from the victim
- attackers then carry out unwanted actions such as changing a password or transferring money
from a bank account


CSRF Mitigation - CORRECT ANSWER - - CSRF tokens
- SameSite cookies
- avoid using GET requests for state-changing actions


SSRF - CORRECT ANSWER - - Server-side Request Forgery
- attacker us able to send requests on behalf of the server

, - allows attackers to forge the request signature and assume a privileged position on a network,
bypassing firewall controls, and gaining access to internal services


SSRF Mitigation - CORRECT ANSWER - - never make outbound requests based on user
input
- validate external addresses before initiating any outbound requests


PDB - CORRECT ANSWER - - debugger built into the Python standard library


Which three actions are supported by the Python Debugger (PDB)? (Choose 3 answers.) -
CORRECT ANSWER - - establishing breakpoints
- code step throughs
- stack tracing


Which three debugging techniques require the use of a debugger? (Choose 3 answers.) -
CORRECT ANSWER - - trace points
- breakpoints
- code step through


What do system monitoring and review of audit trails provide? - CORRECT ANSWER --
Accountability


What are the logging levels and values? - CORRECT ANSWER - - DEBUG = 10
- INFO = 20
- WARNING = 30
- ERROR = 40
- CRITICAL = 50


Which logging function may indicate an impending full disk? - CORRECT ANSWER --
WARNING

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
7 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions