{"id":132251,"date":"2024-03-08T03:04:56","date_gmt":"2024-03-08T03:04:56","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=132251"},"modified":"2024-03-08T03:04:58","modified_gmt":"2024-03-08T03:04:58","slug":"wgu-d385-logging-and-security-issues-objective-assessment-2024-actual-exam-test-bank","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2024\/03\/08\/wgu-d385-logging-and-security-issues-objective-assessment-2024-actual-exam-test-bank\/","title":{"rendered":"WGU D385 LOGGING AND SECURITY ISSUES OBJECTIVE ASSESSMENT  2024 ACTUAL EXAM TEST BANK"},"content":{"rendered":"\n<p>WGU D385 LOGGING AND SECURITY ISSUES OBJECTIVE ASSESSMENT<\/p>\n\n\n\n<p>Which two classes does the bdb module implement? &#8211; ANSWER- &#8211;<br>Breakpoint<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bdb<br>Which attribute provides a dictionary of breakpoint instances? &#8211;<br>ANSWER- &#8211; bplist<\/li>\n\n\n\n<li>maintains a (file, line) tuple of breakpoints<br>Which function can be used to return all set breakpoints? &#8211; ANSWER- &#8211;<br>get_all_breaks( )<\/li>\n\n\n\n<li>returns a string with all set breakpoints<br>Which three data types are considered user-provided? &#8211; ANSWER- &#8211;<br>cookies<\/li>\n\n\n\n<li>POST data payloads<\/li>\n\n\n\n<li>URL parameters<\/li>\n<\/ul>\n\n\n\n<p>How many arguments does the clear_break() method take? &#8211; ANSWER-<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Two<\/li>\n\n\n\n<li>filename, line number<br>Which three QA security-specific test type categories must be performed<br>on software? &#8211; ANSWER- &#8211; benchmark<\/li>\n\n\n\n<li>scheduled<\/li>\n\n\n\n<li>exploratory<br>Manual Code Review Process Steps &#8211; ANSWER- 1. identify security<br>code review objectives<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>perform preliminary scan<\/li>\n\n\n\n<li>review code for security issues<\/li>\n\n\n\n<li>review for security issues unique to the architecture<br>What are limitations of Static Code Analysis? &#8211; ANSWER- &#8211; does not<br>account for runtime vulnerabilities<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>requires the tester to posses both testing and software development<br>skills<\/li>\n\n\n\n<li>tools would have to be language specific<br>What are advantages of Static Code Analysis? &#8211; ANSWER- &#8211; fast<br>turnaround time, especially when tools are used<\/li>\n<\/ul>\n\n\n\n<p>What are advantages of Dynamic Code Analysis? &#8211; ANSWER- &#8211; there is<br>no need to understand how to write software<br>What are limitations of Dynamic Code Analysis? &#8211; ANSWER- &#8211; false<br>negatives and false positives<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>dependent on the correctness of the rules<\/li>\n\n\n\n<li>false sense of security<br>How should Loggers be instantiated? &#8211; ANSWER- &#8211; never instantiated<br>directly<\/li>\n\n\n\n<li>always through the module-level function<\/li>\n\n\n\n<li>logging.getLogger(name)<br>What Logger method sets the threshold for the logger instance?<br>How does it work? &#8211; ANSWER- &#8211; setLevel(level)<\/li>\n\n\n\n<li>logging messages which are less severe than &#8220;level&#8221; will be ignored<\/li>\n\n\n\n<li>logging messages which have severity &#8220;level&#8221; or higher will be emitted<br>by whichever handle or handlers service this logger<br>Security Logs &#8211; ANSWER- &#8211; record access to resources such as files,<br>folders, printers<br>What standard specifies minimum security requirements for audit data<br>(logs)? &#8211; ANSWER- &#8211; NIST FIPS 200<\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<p>Defensive Coding Basic Concepts? &#8211; ANSWER- &#8211; all data is important<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>all data is tainted<\/li>\n\n\n\n<li>all code is insecure<\/li>\n\n\n\n<li>design by contract<\/li>\n\n\n\n<li>sanitize (make sure no attack characters)<br>6 important aspects of OSSTMM? &#8211; ANSWER- &#8211; Open Source Security<br>Testing Methodology Manual<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>project scope<\/li>\n\n\n\n<li>confidentiality<\/li>\n\n\n\n<li>change process<\/li>\n\n\n\n<li>test plan<\/li>\n\n\n\n<li>test process<\/li>\n\n\n\n<li>reporting standard<br>Six Sigma DMAIC &#8211; ANSWER- &#8211; define<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>measure<\/li>\n\n\n\n<li>analyze<\/li>\n\n\n\n<li>improve<\/li>\n\n\n\n<li>control<br>Six Sigma DMADV &#8211; ANSWER- &#8211; define<\/li>\n\n\n\n<li>measure<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_144-1024x763.png\" alt=\"\" class=\"wp-image-132252\"\/><\/figure>\n\n\n\n<p>Download the full exam pdf here <a href=\"https:\/\/learnexams.com\/search\/study?query=\" data-type=\"link\" data-id=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU D385 LOGGING AND SECURITY ISSUES OBJECTIVE ASSESSMENT Which two classes does the bdb module implement? &#8211; ANSWER- &#8211;Breakpoint How many arguments does the clear_break() method take? &#8211; ANSWER- What are advantages of Dynamic Code Analysis? &#8211; ANSWER- &#8211; there isno need to understand how to write softwareWhat are limitations of Dynamic Code Analysis? &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[156],"class_list":["post-132251","post","type-post","status-publish","format-standard","hentry","category-exams-certification","tag-wgu-d385"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/132251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=132251"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/132251\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=132251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=132251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=132251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}