• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D385 Software Security and Testing Exam 2026/2027 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS New Latest Updated Version (4pages)

exam bundles Aug 10, 2025
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

WGU D385 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS 2026 What is Defensive Programming? - ANSWER- - assume mistakes will happen and guard against them - assertions are the most common way of doing this - code checks itself as it runs - always check, validate, and sanitize data Which attribute provides a dictionary of breakpoint instances? - ANSWER- - bplist - maintains a (file, line) tuple of breakpoints Which function can be used to return all set breakpoints? - ANSWER- - get_all_breaks( ) - returns a string with all set breakpoints Which 3 data types are considered user-provided? - ANSWER- - cookies - POST data payloads - URL parameters What are limitations of Static Code Analysis - ANSWER- - does not account for runtime vulnerabilities - requires the tester to posses both testing and software development skills - tools would have to be language specific Advantage of Static Code Analysis? - ANSWER- - fast turnaround time - especially when tools are used Advantage of Dynamic Code Analysis? - ANSWER- - no need to understand how to write software - finds runtime vulnerabilities - requires only a running system; conducted on any application Limitations of Dynamic Code Analysis? - ANSWER- - false positives and false negatives - dependent on the correctness of the rules - false sense of security - difficult to trace back to exact location What kind of attacks does Client-side Testing look to prevent? - ANSWER- - XSS - SQLi - CORS - Clickjacking - HTML injection Secure Unit Testing - ANSWER- - check for bad input - bypass security - inject bad data How to hash with sha256 in Python? - ANSWER- import hashlibsha256 = hashlib.sha256()sha256.update(b'message')hash = sha256.hexdigest() Examples of Block Ciphers? - ANSWER- - Triple DES - Blowfish - Twofish - AES Examples of Stream Ciphers? - ANSWER- - RC4 - ChaCha TLS Handshake: 3 Tasks - ANSWER- 1. cipher suite negotiation 2. key exchange 3. server authentication Set-Cookie Response Header 5 Directives? - ANSWER- - HttpOnly - SameSite - Secure - Domain - Max-Age Secure Directive - ANSWER- - prevents MITM - ensures cookie transmitted over HTTPS OAuth 4 Phases - ANSWER- 1. requesting authorization 2. granting authorization 3. performing token exchange 4. accessing protected resources What kind of attack does client testing seek to prevent? - ANSWER- - HTML-injection Attack Which security dimension involves determining who created which data? - ANSWER- - data authentication What is the preimage resistance property of a hash function? - ANSWER- - one-way function Which two safeguards does a digital signature guarantee? (Choose 2 answers.) - ANSWER- - nonrepudiation - data integrity 3 methods for protecting against XSS? - ANSWER- - validating input - escaping output - managing response headers 


Download Study Material

Buy This Study Material

$5.00
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: exam bundles
Description:

WGU D385 Software Security and Testing Exam 2026/2027 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS New Latest Updated Version (4pages)

UNLOCK ACCESS $5.00