• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D385: FINAL

Latest WGU Jan 16, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D385: FINAL

Leave the first rating Students also studied Terms in this set (46) Western Governors UniversityD 385 Save D385 Pre-Assessment (All Correct) 39 terms Cydo_EntisPreview D385 Software Security and Testing...69 terms sdelbonPreview D385 - Software Security Testing 34 terms Brandon_Lewis664 Preview

D385 -

108 term esth What is Defensive Programming?- assume mistakes will happen and guard against them

  • assertions are the most common way of doing this
  • code checks itself as it runs
  • always check, validate, and sanitize data
  • Which attribute provides a dictionary of breakpoint instances?

  • bplist
  • maintains a (file, line) tuple of breakpoints
  • Which function can be used to return all set breakpoints? - get_all_breaks( )

  • returns a string with all set breakpoints
  • Which 3 data types are considered user-provided? - cookies

  • POST data payloads
  • URL parameters
  • What are limitations of Static Code Analysis- does not account for runtime vulnerabilities

  • requires the tester to posses both testing and software development skills
  • tools would have to be language specific
  • Advantage of Static Code Analysis?- fast turnaround time

  • especially when tools are used
  • Advantage of Dynamic Code Analysis?- no need to understand how to write software

  • finds runtime vulnerabilities
  • requires only a running system; conducted on any application

Limitations of Dynamic Code Analysis?- false positives and false negatives

  • dependent on the correctness of the rules
  • false sense of security
  • difficult to trace back to exact location
  • What kind of attacks does Client-side Testing look to prevent?

  • XSS
  • SQLi

- CORS

  • Clickjacking
  • HTML injection
  • Secure Unit Testing- check for bad input

  • bypass security
  • inject bad data
  • How to hash with sha256 in Python?import hashlibsha256 = hashlib.sha256()sha256.update(b'message')hash = sha256.hexdigest() Examples of Block Ciphers?- Triple DES

  • Blowfish
  • Twofish
  • AES
  • Examples of Stream Ciphers?- RC4

  • ChaCha

TLS Handshake: 3 Tasks1. cipher suite negotiation

  • key exchange
  • server authentication
  • Set-Cookie Response Header 5 Directives?- HttpOnly

  • SameSite
  • Secure
  • Domain
  • Max-Age
  • Secure Directive- prevents MITM

  • ensures cookie transmitted over HTTPS
  • OAuth 4 Phases1. requesting authorization

  • granting authorization
  • performing token exchange
  • accessing protected resources
  • What kind of attack does client testing seek to prevent? - HTML-injection Attack Which security dimension involves determining who created which data?

  • data authentication
  • What is the preimage resistance property of a hash function?

  • one-way function

Which two safeguards does a digital signature guarantee? (Choose 2 answers.)

  • nonrepudiation
  • data integrity
  • methods for protecting against XSS?- validating input
  • escaping output
  • managing response headers
  • What vectors can malicious code arrive in?- body

  • URL
  • header of an HTTP request

Example of CSP- Content-Security-Policy: script-src none

CSRF Mitigation- SameSite directive set to "strict"

  • Referer header validation
  • CSRF Tokens
  • Which data structure does the frame-ancestors setting in the CSP header take?

  • tuple
  • Which preflight request property is triggered by the browser requesting API data?

  • Readablestream
  • Which setting allows for specifying permitted methods? - CORS-ALLOW-METHODS Which request methods are considered to be "idempotent"?

  • PUT

- DELETE

Which request methods are considered to be "safe"? - GET

- HEAD

- OPTIONS

- TRACE

Common Status Codes?- 200 = OK

- 201 = CREATED

- 400 = BAD REQUEST

- 401 = UNAUTHORIZED

- 404 = NOT FOUND

- 405 = METHOD NOT ALLOWED

- 500 = INTERNAL SERVER ERROR

Which value of the X-Frame-Options directive allows a page to be displayed in a frame of another page?

- SAMEORIGIN

Which value for the X-Frame-Options directive will not allow any page to be displayed in a frame of another page?

- DENY

Which setting can be used to configure the value of Access-Control-Allow-Origin?

- CORS_ORIGIN_WHITELIST

Which setting allows the browser to send cookies? - CORS-ALLOW-CREDENTIALS SameSite Directive setting NONE- browser will echo the session ID cookie without any conditions back to the server

  • cannot be the default
  • SameSite Directive setting "strict"- browser will only echo the session ID cookie for same site requests SameSite Directive setting "Lax"- browser will echo the session ID cookie for the same site and cross-site top- level navigation requests that use safe HTTP methods like GET

- DEFAULT

Which referrer policy enforces sending nothing if the protocol is downgraded from HTTPS to HTTP?

  • strict-origin
  • Which referrer policy allows for unconditionally sending the referrer address for every request?

  • unsafe-url
  • Which directive does the browser fall back to when it does not get a specific fetch directive?

  • default-src
  • Which cross-site scripting (XSS) attack relies on the client-side equivalent of the redirect statement?

  • Persistent
  • Which cross-site scripting (XSS) attack relies on a URL- embedded script?

  • Reflective
  • Which HTTP Header indicates the type of content an API client can accept?

  • Accept
  • What is the primary defense against log injection attacks? - strictly sanitize outbound log messages by implementing an allow list of characters Impact of Log Injection Attacks?- Logs might be tampered with or added

  • If the application allows log records to be parsed, it might be possible to inject
  • executable code into the web application.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured practical examples that was incredibly useful for my research. Such an impressive resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 16, 2026
Description:

D385: FINAL Leave the first rating Students also studied Terms in this set Western Governors UniversityD 385 Save D385 Pre-Assessment (All Correct) 39 terms Cydo_Entis Preview D385 Software Securit...

Unlock Now
$ 11.00