100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D385 OA Prep | Questions & verified and Correct Answers |Already Graded A+ 2025/26 Update | 100% Correct

Beoordeling
-
Verkocht
-
Pagina's
35
Cijfer
A+
Geüpload op
08-10-2025
Geschreven in
2025/2026

WGU D385 OA Prep | Questions & verified and Correct Answers |Already Graded A+ 2025/26 Update | 100% Correct What is the primary defense against log injection attacks? - ANSWER Sanitize outbound log messages An attacker exploits a cross-site scripting vulnerability. What is the attacker able to do? - ANSWER Access the user's data Which method is used for a SQL injection attack? - ANSWER Exploiting query parameters Maslow's Growth Needs - ANSWER Cognitive, Aesthetic, Self-Actualization, Transcendence Maslow's Physiological Need - ANSWER Biological needs for survival, food, water, shelter Maslow's Safety Need - ANSWER Protection from the elements, law and order, financial security, and freedom from fear. Maslow's Love and Belonging Need - ANSWER Need for interpersonal relationships - friendships, intimacy, being part of a group. Maslow's Esteem Need - ANSWER Self-respect, respect from others, achievement, status, and prestige. Maslow's Cognitive Need - ANSWER Curiosity, knowledge, and intellectual exploration Maslow's Aesthetic Need - ANSWER Need focuses on the search for and expression of beauty and balance. Maslow's Self-Actualization Need - ANSWER Personal growth and fulfillment and the realization of one's personal potential as a human being. Maslow's Transcendence Need - ANSWER Meeting spiritual needs or helping others achieve self-actualization. Arnold Gesell - ANSWER First theorist to observe and document stages of physical development. Gesell's Maturational Theory - ANSWER Child's growth & development are influenced by both their environment and genes in sequential order Infancy - ANSWER The stage of development that begins at birth and lasts between 18 and 24 months. Dozens of motor skills are added. Early Childhood - ANSWER The stage of development from 2 - 6 years old. Improvements occur in both fine and gross motor skills. Middle Childhood - ANSWER The stage of development from 6 - 10 years old. Slow but steady gains in weight and height. Adolescence - ANSWER The stage of development from 10 - 18 years old. Weight and height increase rapidly and puberty begins. Jean Piaget - ANSWER Swiss psychologist known for his Theory of Cognitive Development. Formal Operational Stage - ANSWER Stage of development for 12 years and up. Abstract thought begins. Higher order thinking and ability to systematically plan for future. Schema - ANSWER Categories of knowledge that help us to interpret and understand the world. An organized pattern of behavior or thought. Assimilation - ANSWER Process of using or transforming the environment so that it can be placed in preexisting cognitive structures (schema). Accomodation - ANSWER Process of changing cognitive structures (schema) in order to accept something from the environment. Can also develop new schemas. Equilibration - ANSWER The attempt to strike a balance between assimilation and accommodation. The tendency to organize schemas. Vygotsky's Theory of Cognitive Development - ANSWER Lev Vygotsky's sociocultural theory that emphasized the important role of social interactions in the development of children's cognition. Zone of Proximal Development (ZPD) - ANSWER The place where the most sensitive instruction or guidance should be given. It is the link between what we can do and what we can't do. More Knowledgeable Other (MKO) - ANSWER Someone who has a better understanding or a higher ability level than the learner. Vygotsky's Social Approach to Language Development - ANSWER Language develops through social interactions. Bandura's Social Learning Theory - ANSWER Learning occurs through observation and modeling. 3 Types of Modeling - ANSWER Live models, direct instruction, and symbolic instruction. Carol Gilligan's Theory of Gender and Moral Development - ANSWER Based her work on Kohlberg's theories, but states gender might influence ethical development. Ethics of Care - ANSWER Women's moral and ethical decisions often focus on way decisions will affect people and relationships. Kohlberg's Theory of Moral Development - ANSWER Moral development takes place in stages. Preconventional Stage - ANSWER Moral development stage where your behavior is influenced by rewards and punishments Conventional Stage - ANSWER Moral development stage where your behavior is influenced by peer pressure/society Postconventional Stage - ANSWER Moral development stage where your behavior is influenced by your own ethics Erikson's Stages of Psychosocial Development - ANSWER 8 stages of identify development where people are motivated by the need to achieve competence in certain areas of their lives. Piaget's Theory of Cognitive Development - ANSWER Theory that suggests children move through four different stages of development. Sensorimotor, Preoperational, Concrete Operational, and Formal Operational. Sensorimotor Stage - ANSWER Stage of development from birth to 2 years. Infants and toddlers acquire knowledge through sensory experiences and manipulating objects. Object Permanence - ANSWER The understanding that objects continue to exist even when they cannot be seen. Major development of sensorimotor stage. Preoperational Stage - ANSWER Stage of development from 2 to 7 years. Kids learn through pretend play. Egocentric and struggle to see others perspective. Concrete Operational Stage - ANSWER Stage of development from 7 to 11 years. Logical thought begins, and they understand the idea of conservation. Status 403 code - ANSWER Forbidden Access not granted based on supplied credentials Status code 403 is common when? - ANSWER NO HEADER is provided in the GET request python length function - ANSWER The len() function in Python returns the number of items in an object. The object can be a sequence (such as a string, tuple, or list) or a collection (such as a dictionary or set Status code 201 - ANSWER - Created - your request was accepted and the resource was created Two common defensive coding techniques - ANSWER check functional preconditions and postconditions Defensive Coding Techniques - ANSWER a proactive approach to software development that focuses on anticipating and handling potential issues before they occur, improving the robustness and stability of the application. It involves implementing safeguards, like input validation and error handling, to prevent bugs, crashes, and vulnerabilities Best way to ensure API is protected against privilege escalation - ANSWER implement resource and field-level access control Privilege Escalation - ANSWER a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications Broken Object Level Authorization - ANSWER a security vulnerability where an application fails to properly verify a user's permissions to access specific data objects, allowing unauthorized access or manipulation of data Python type() function - ANSWER check the data type of the input. isinstance() - ANSWER A more robust way to check if an object is an instance of a particular class or a tuple of classes (allowing for inheritance) isdigit() - ANSWER Checks if a string consists only of digits isalpha() - ANSWER Checks if a string consists only of alphabetic characters isalnum() - ANSWER Checks if a string consists only of alphanumeric characters startswith(), endswith() - ANSWER Check if a string starts or ends with a specific substring len() - ANSWER Checks the length of a string strip(), lstrip(), rstrip( - ANSWER Remove leading/trailing whitespace Conditional Statements - ANSWER if, elif, else Exception Handling - ANSWER try, except assertions - ANSWER "Statements used to test assumptions about your code. Contain conditional checking and an optional error message that is displayed if the condition is False." Null special value in Python - ANSWER NONE 401 vs 403 - ANSWER Authentication vs authorization 401: focuses on invalid or missing authentication credentials. 403: pertains to valid authentication but inadequate authorization which protocol caches a token after it has been acquired - ANSWER MSAL, Microsoft Authentication Library What does cross-origin resource sharing (CORS) allow users to do? - ANSWER Override same starting policy for specific resources Which protocol caches a token after it has been acquired? - ANSWER MSAL Which response method, when sent a request, returns information about the server's response and is delivered back to the console? - ANSWER nt Status Codes - ANSWER - 200 = OK - 201 = CREATED - 400 = BAD REQUEST - 401 = UNAUTHORIZED - 403 = FORBIDDEN - 404 = NOT FOUND - 405 = METHOD NOT ALLOWED - 500 = INTERNAL SERVER ERROR What is best for input validation? - ANSWER type(): The type() function is used to determine the type of an object. While it's not typically used for input validation directly, it can be used to check the type of user input to ensure it matches the expected data type (e.g., checking if an input is an integer or a string). Prevent log injection - ANSWER validate() A user masquerades as other users, what type of attack was used? - ANSWER Cross Site Scripting What is returned when using nt - ANSWER returns the raw binary content of the HTTP response as bytes. What can an attacker do with a log injection attack - ANSWER Injection of commands a parser can execute Which software testing relies on using old test cases? - ANSWER Regression testing When should regression testing be conducted? - ANSWER After some code changes Access Control Allow Origin- client request to (server) , what does server send back? - ANSWER ACAO Which Python function is prone to a potential code injection attack? - ANSWER eval() What are two common defensive coding techniques? - ANSWER Check functional and preconditions and postconditions Which package is meant for internal use by Python for regression testing? - ANSWER test A security analyst has noticed a vulnerability in which an attacker took over multiple users' accounts. Which vulnerability did the security analyst encounter? - ANSWER Broken access control When creating a new user, an administrator must submit the following fields to an API endpoint: Name Email Address Password IsAdmin What is the best way to ensure the API is protected against privilege escalation? - ANSWER Implement resource and field-level access control What is the primary defense against log injection attacks? - ANSWER Sanitize outbound log messages Uses the same key for encryption and decryption. Hash - ANSWER One-way Encryption function. Transforms input of any size into a fixed-size output Cross-site scripting - ANSWER Security vulnerability. Attacker injects malicious scripts into websites viewed by other users. Scripts execute in the victim's browser. Can steal cookies, redirect users, deface sites, etc. Often targets input fields that aren't properly sanitized. Prevention: Input sanitization, output encoding, Content Security Policy (CSP). Deserialization - ANSWER Process of converting data from a serialized format (e.g., JSON, XML, Pickle) back into an object or data structure in memory. Security risk if untrusted data is deserialized without proper validation. Validate and sanitize serialized data, avoid deserializing untrusted sources, use safer serialization formats.

Meer zien Lees minder
Instelling
WGU D385
Vak
WGU D385











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D385
Vak
WGU D385

Documentinformatie

Geüpload op
8 oktober 2025
Aantal pagina's
35
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D385 OA Prep | Questions & verified and
Correct Answers |Already Graded A+ 2025/26 Update
| 100% Correct

What is the primary defense against log injection attacks? - ANSWER Sanitize
outbound log messages


An attacker exploits a cross-site scripting vulnerability. What is the attacker able
to do? - ANSWER Access the user's data
Which method is used for a SQL injection attack? - ANSWER Exploiting query
parameters
Maslow's Growth Needs - ANSWER Cognitive, Aesthetic, Self-Actualization,
Transcendence


Maslow's Physiological Need - ANSWER Biological needs for survival, food,
water, shelter


Maslow's Safety Need - ANSWER Protection from the elements, law and order,
financial security, and freedom from fear.


Maslow's Love and Belonging Need - ANSWER Need for interpersonal
relationships - friendships, intimacy, being part of a group.


Maslow's Esteem Need - ANSWER Self-respect, respect from others,
achievement, status, and prestige.

, Maslow's Cognitive Need - ANSWER Curiosity, knowledge, and intellectual
exploration


Maslow's Aesthetic Need - ANSWER Need focuses on the search for and
expression of beauty and balance.


Maslow's Self-Actualization Need - ANSWER Personal growth and fulfillment
and the realization of one's personal potential as a human being.


Maslow's Transcendence Need - ANSWER Meeting spiritual needs or helping
others achieve self-actualization.


Arnold Gesell - ANSWER First theorist to observe and document stages of
physical development.


Gesell's Maturational Theory - ANSWER Child's growth & development are
influenced by both their environment and genes in sequential order


Infancy - ANSWER The stage of development that begins at birth and lasts
between 18 and 24 months. Dozens of motor skills are added.


Early Childhood - ANSWER The stage of development from 2 - 6 years old.
Improvements occur in both fine and gross motor skills.


Middle Childhood - ANSWER The stage of development from 6 - 10 years old.
Slow but steady gains in weight and height.

,Adolescence - ANSWER The stage of development from 10 - 18 years old.
Weight and height increase rapidly and puberty begins.


Jean Piaget - ANSWER Swiss psychologist known for his Theory of Cognitive
Development.




Formal Operational Stage - ANSWER Stage of development for 12 years and up.
Abstract thought begins. Higher order thinking and ability to systematically plan
for future.


Schema - ANSWER Categories of knowledge that help us to interpret and
understand the world. An organized pattern of behavior or thought.


Assimilation - ANSWER Process of using or transforming the environment so that
it can be placed in preexisting cognitive structures (schema).


Accomodation - ANSWER Process of changing cognitive structures (schema) in
order to accept something from the environment. Can also develop new schemas.


Equilibration - ANSWER The attempt to strike a balance between assimilation
and accommodation. The tendency to organize schemas.


Vygotsky's Theory of Cognitive Development - ANSWER Lev Vygotsky's
sociocultural theory that emphasized the important role of social interactions in the
development of children's cognition.

, Zone of Proximal Development (ZPD) - ANSWER The place where the most
sensitive instruction or guidance should be given. It is the link between what we
can do and what we can't do.


More Knowledgeable Other (MKO) - ANSWER Someone who has a better
understanding or a higher ability level than the learner.


Vygotsky's Social Approach to Language Development - ANSWER Language
develops through social interactions.


Bandura's Social Learning Theory - ANSWER Learning occurs through
observation and modeling.


3 Types of Modeling - ANSWER Live models, direct instruction, and symbolic
instruction.


Carol Gilligan's Theory of Gender and Moral Development - ANSWER Based her
work on Kohlberg's theories, but states gender might influence ethical
development.


Ethics of Care - ANSWER Women's moral and ethical decisions often focus on
way decisions will affect people and relationships.


Kohlberg's Theory of Moral Development - ANSWER Moral development takes
place in stages.


Preconventional Stage - ANSWER Moral development stage where your behavior
is influenced by rewards and punishments
€19,25
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
munywokikatinda

Maak kennis met de verkoper

Seller avatar
munywokikatinda Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
11 maanden
Aantal volgers
0
Documenten
50
Laatst verkocht
-
Professional academic hub

You will get solutions to all subjects in both assignments and major exams. Contact me for any assistance. Good luck! Simple, well-researched education material for you. Expertise in nursing, mathematics, psychology, biology, etc. My Work contains the latest, updated Exam Solutions, study guides, and notes. 100% verified Guarantee

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen