100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

D385 - Software and Security Testing WGU Questions & Answers

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
24-03-2025
Escrito en
2024/2025

Which Python function is prone to a potential code injection attack? - eval() How do you prevent log injection? - validate() What are two common defensive coding techniques? - Check functional preconditions and postconditions What is checking functional preconditions and post conditions best practice for? - Defensive Coding What happens when an attacker exploits a cross-site scripting vulnerability? - Access to the User's data A user masquerades as (or pretends to be) another user. What type of attack is this? - Cross-Site Scripting Which method is used for a SQL injection

Mostrar más Leer menos
Institución
D385
Grado
D385










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D385
Grado
D385

Información del documento

Subido en
24 de marzo de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

D385: Logging and Security Issues Practice Written Exam
| Questions & Answers 2025
What are some common debugging techniques? - ✔✔✔- printing out values of variables

- changing the state ("path") of the program to make it do different things

- stepping through the execution of a program line by line

- breakpoints

- trace points

- stopping the program at certain events

- viewing the output of a program in a debugger window



What are some Python debugging tools? - ✔✔✔- pdb: most commonly used

- Web-PDB

- wdb

- Pyflame

- objgraph



XML External Entity Attacks - ✔✔✔- XXE

- when attackers exploit an XML parser to read arbitrary files on your server

- attackers might also be able to read config files, retrieve user information



Insecure Deserialization - ✔✔✔- serialization is the conversion of an object in a programming language
is saved into a format that can be saved to a database

- DEserialization is when a serialized object is read from a file or the network and converted back into an
object

- INSECURE DESERIALIZATION occurs when an attacker can manipulate the serialized object and achieve
authentication bypass, DOS, or arbitrary code execution



Injection Attacks - ✔✔✔- when an application cannot properly distinguish between untrusted user data
and code

,- typically allows for arbitrary code execution



SQL Injection Attack Mitigation - ✔✔✔- use parameterized statements



Log Injection Attack Mitigation - ✔✔✔- prefixing log entries with meta-data (i.e. timestamp)

- validate the entry before accessing or opening



Sensitive Data Leaks - ✔✔✔- occurs when an application fails to properly protect sensitive information

- this typically occurs through descriptive response headers, descriptive error messages with stack traces
or database error messages, or revealing comments in HTML files



Cross-site Request Forgery - ✔✔✔- client-side technique used to attack other users of a web application

- attackers send HTTP requests that pretend to come from the victim

- attackers then carry out unwanted actions such as changing a password or transferring money from a
bank account



CSRF Mitigation - ✔✔✔- CSRF tokens

- SameSite cookies

- avoid using GET requests for state-changing actions



SSRF - ✔✔✔- Server-side Request Forgery

- attacker us able to send requests on behalf of the server

- allows attackers to forge the request signature and assume a privileged position on a network,
bypassing firewall controls, and gaining access to internal services



SSRF Mitigation - ✔✔✔- never make outbound requests based on user input

- validate external addresses before initiating any outbound requests



PDB - ✔✔✔- debugger built into the Python standard library

, Which three actions are supported by the Python Debugger (PDB)? (Choose 3 answers.) - ✔✔✔-
establishing breakpoints

- code step throughs

- stack tracing



Which three debugging techniques require the use of a debugger? (Choose 3 answers.) - ✔✔✔- trace
points

- breakpoints

- code step through



What do system monitoring and review of audit trails provide? - ✔✔✔- Accountability



What are the logging levels and values? - ✔✔✔- DEBUG = 10

- INFO = 20

- WARNING = 30

- ERROR = 40

- CRITICAL = 50



Which logging function may indicate an impending full disk? - ✔✔✔- WARNING

- indicates that there could be a problem in the immediate future



What does DEBUG indicate? - ✔✔✔- only used when diagnosing software problems



What does CRITICAL indicate? - ✔✔✔- indicates catastrophic code malfunction



What does ERROR indicate? - ✔✔✔- indicates code malfunction



What is defensive programming? - ✔✔✔- assuming mistakes will happen and guarding against them
$7.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
RISEPREP

Conoce al vendedor

Seller avatar
RISEPREP Oxford University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
1 año
Número de seguidores
1
Documentos
354
Última venta
1 mes hace
Get Quality of Document

Hello I'm a passionate and experienced online tutor. I offer support to help students succeed. you can access study materials, notes, and guides to help you excel academically I am hear to help you. review so as to know the quality of service offered & to better improve your expirience. thank you and welcome back. BONUS! BONUS! BONUS! For every student you refer to me with an order that is completed and paid transparently, I will give you one free study document you need or do one assignment for you, free of charge!Thank you Very much for the purchase Kindly leave a Review to help know the Quality of Document and those who have reviewed thanks again

Lee mas Leer menos
0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes