100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

C836 WGU Study Review with Complete Solutions

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
20-07-2025
Escrito en
2024/2025

bounds checking - ANSWER -to set a limit on the amount of data we expect to receive to set aside storage for that data *required in most programming languages * prevents buffer overflows race conditions - ANSWER -A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions input validation - ANSWER -a type of attack that can occur when we fail to validate the input to our applications or take steps to filter out unexpected or undesirable content format string attack - ANSWER -a type of input validation attacks in which certain print functions within a programming language can be used

Mostrar más Leer menos
Institución
C836 WGU
Grado
C836 WGU










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C836 WGU
Grado
C836 WGU

Información del documento

Subido en
20 de julio de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C836 WGU Study Review with Complete Solutions
bounds checking - ANSWER -to set a of attack that can occur when we fail to
limit on the amount of data we expect to properly design our security mechanisms
receive to set aside storage for that data when implementing cryptographic controls in
*required in most programming languages our applications
* prevents buffer overflows

client-side attack - ANSWER -A type of
race conditions - ANSWER -A type of attack that takes advantage of weaknesses in
software development vulnerability that the software loaded on client machines or
occurs when multiple processes or multiple one that uses social engineering techniques
threads within a process control or share to trick us into going along with the attack
access to a particular resource, and the
correct handling of that resource depends on
the proper ordering or timing of transactions XSS (Cross Site Scripting) - ANSWER -
an attack carried out by placing code in the
form of a scripting language into a web page
input validation - ANSWER -a type of or other media that is interpreted by a client
attack that can occur when we fail to validate browser
the input to our applications or take steps to
filter out unexpected or undesirable content
XSRF (cross-site request forgery) -
ANSWER -an attack in which the
format string attack - ANSWER -a type attacker places a link on a web page in such a
of input validation attacks in which certain way that it will be automatically executed to
print functions within a programming initiate a particular activity on another web
language can be used to manipulate or view page or application where the user is
the internal memory of an application currently authenticated


authentication attack - ANSWER -A SQL Injection Attack - ANSWER -
type of attack that can occur when we fail to Attacks against a web site that take
use strong authentication mechanisms for advantage of vulnerabilities in poorly coded
our applications SQL (a standard and common database
software application) applications in order to
introduce malicious program code into a
authorization attack - ANSWER -A type company's systems and networks.
of attack that can occur when we fail to use
authorization best practices for our
applications clickjacking - ANSWER -An attack that
takes advantage of the graphical display
capabilities of our browser to trick us into
cryptographic attack - ANSWER -A type clicking on something we might not otherwise


, C836 WGU Study Review with Complete Solutions
to gain access to resources that the user
normally would be restricted from accessing.
server-side attack - ANSWER -A type of * via SQL injection or local issues
attack on the web server that can target
vulnerabilities such as lack of input
validation, improper or inadequate validating user inputs - ANSWER -a
permissions, or extraneous files left on the security best practice for all software
server from the development process * the most effective way of mitigating SQL
injection attacks

Protocol issues, unauthenticated access,
arbitrary code execution, and privilege Nikto (and Wikto) - ANSWER -A web
escalation - ANSWER -Name the 4 server analysis tool that performs checks for
main categories of database security issues many common server-side vulnerabilities &
creates an index of all the files and directories
it can see on the target web server (a process
web application analysis tool - known as spidering)
ANSWER -A type of tool that analyzes
web pages or web-based applications and
searches for common flaws such as XSS or burp suite - ANSWER -A well-known
SQL injection flaws, and improperly set GUI web analysis tool that offers a free and
permissions, extraneous files, outdated professional version; the pro version includes
software versions, and many more such advanced tools for conducting more in-depth
items attacks


protocol issues - ANSWER - fuzzer - ANSWER -A type of tool that
unauthenticated flaws in network protocols, works by bombarding our applications with
authenticated flaws in network protocols, all manner of data and inputs from a wide
flaws in authentication protocols variety of sources, in the hope that we can
cause the application to fail or to perform in
unexpected ways
arbitrary code execution - ANSWER -An
attack that exploits an applications
vulnerability into allowing the attacker to MiniFuzz File Fuzzer - ANSWER -A tool
execute commands on a user's computer. developed by Microsoft to find flaws in file-
* arbitrary code execution in intrinsic or handling source code
securable SQL elements

BinScope Binary Analyzer - ANSWER -A
Privilege Escalation - ANSWER -An tool developed by Microsoft to examine
attack that exploits a vulnerability in software source code for general good practices


, C836 WGU Study Review with Complete Solutions
stuxnet - ANSWER -A particularly
complex and impactful item of malware that
SDL Regex Fuzzer - ANSWER -A tool targeted the Supervisory Control and Data
developed by Microsoft for testing certain Acquisition (SCADA) systems that run various
pattern-matching expressions for potential industrial processes; this piece of malware
vulnerabilities raised the bar for malware from largely being
a virtual-based attack to actually being
physically destructive
good sources of secure coding guidelines -
ANSWER -CERT, NIST 800, BSI, an
organization's internal coding guidelines anti-malware tool - ANSWER -A type of
tool that uses signature matching or anomaly
detection (heuristics) to detect malware
OS hardening - ANSWER -the process threats, either in real-time or by performing
of reducing the number of available avenues scans of files and processes
through which our OS might be attacked

heuristics - ANSWER -the process of
attack surface - ANSWER -The total of anomaly detection used by anti-malware
the areas through which our operating tools to detect malware without signatures
system might be attacked

executable space protection -
6 main hardening categories - ANSWER -A hardware and software-
ANSWER -1. Removing unnecessary based technology that prevents certain
software portions of the memory used by the operating
2. Removing or turning off unessential system and applications from being used to
services execute code
3. Making alterations to common accounts
4. Applying the principle of least privilege
5. Applying software updates in a timely buffer overflow (overrun) - ANSWER -
manner The act of inputting more data than an
6. Making use of logging and auditing application is expecting from a particular
functions input, creating the possibility of executing
commands by specifically crafting the excess
data
Principle of Least Privilege - ANSWER -
states we should only allow a party the
absolute minimum permission needed for it ASLR (Address Space Layout Randomization)
to carry out its function - ANSWER -a security method that
involves shifting the contents of memory
around to make tampering difficult
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MERCYTRISHIA Howard Community College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
180
Miembro desde
1 año
Número de seguidores
35
Documentos
10792
Última venta
7 horas hace
MercyTrishia

On this page, you find all documents, package deals offered by seller MercyTrishia

3.8

37 reseñas

5
16
4
7
3
10
2
0
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes