100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
2024 D385 SOFTWARE SECURITY AND TESTING / WGU D385 SOFTWARE SECURITY AND TESTING REAL EXAM WITH ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) NEWEST UPDATED VERSION LATEST 2024 |ALREADY GRADED A+ (BRAND NEW!!)$17.99
Add to cart
2024 D385 SOFTWARE SECURITY AND TESTING / WGU D385 SOFTWARE SECURITY AND TESTING REAL EXAM WITH ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) NEWEST UPDATED VERSION LATEST 2024 |ALREADY GRADED A+ (BRAND NEW!!)
0 view 0 purchase
Course
2024 D385 SOFTWARE SECURITY
Institution
2024 D385 SOFTWARE SECURITY
Book
Software Security
2024 D385 SOFTWARE SECURITY AND TESTING / WGU D385 SOFTWARE SECURITY AND TESTING REAL EXAM WITH ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) NEWEST UPDATED VERSION LATEST 2024 |ALREADY GRADED A+ (BRAND NEW!!)
2024 D385 SOFTWARE SECURITY AND TESTING / WGU
D385 SOFTWARE SECURITY AND TESTING REAL EXAM
WITH ACTUAL EXAM QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED ANSWERS) NEWEST
UPDATED VERSION LATEST 2024 |ALREADY GRADED A+
(BRAND NEW!!)
What hash function should you use for most general purpose cryptographic hashing?
- ANSWER: SHA-256
What hash function should you consider using for high security environments,
though it may have less support? - ANSWER: SHA3-256
What hash function should you use for very large messages? - ANSWER: BLAKE2
What two hash functions should you avoid, as they're now considered unsecure? -
ANSWER: MD5 and SHA1
What is the difference between hash functions and checksum functions? - ANSWER:
Hash functions have stronger collision resistance, checksums are faster. Checksums
are not useful for security.
What module do you use for cryptographic hashing in Python? - ANSWER: hashlib
What is the logging numeric value for DEBUG? - ANSWER: 10
What does logging.DEBUG indicate? - ANSWER: Detailed information, typically only
of interest to a developer trying to diagnose a problem.
What is the logging numeric value for INFO? - ANSWER: 20
What does logging.INFO indicate? - ANSWER: Confirmation that things are working
as expected
What is the logging numeric value for WARNING? - ANSWER: 30
What does logging.WARNING indicate? - ANSWER: Something unexpected
happened, or that a problem might occur in the near future. Software is still working
as expected.
What is the logging numeric value for ERROR? - ANSWER: 40
, What does logging.ERROR indicate? - ANSWER: Software has not been able to
perform some function due to a more serious problem.
What is the logging numeric value for CRITICAL? - ANSWER: 50
What does logging.CRITICAL indicate? - ANSWER: A serious error, indicating that the
program itself may be unable to continue running.
Should you use the secrets or random module for generating secure random
numbers? - ANSWER: secrets
What do keyed hash functions do? - ANSWER: Hash functions using different keys
produce different hash values of the same message. Hash functions using the same
key produce matching hash values of the same message. Ensures data
authentication.
What are HMAC functions? - ANSWER: A generic way to use any ordinary hash
function as though it were a keyed hash function, since most hash functions don't
support keys natively. Takes 3 inputs: message, key, ordinary cryptographic hash
function.
What is a timing attack? - ANSWER: Attacker obtains hints about private information
by measuring the time a system takes to perform an operation (ex: string
comparison)
How can you avoid a timing attack with the hmac module? - ANSWER: You can use
compare_digest in place of ==. This always compares all characters before it returns
thus preventing timing attack vulnerabilities.
What is a side channel attack? - ANSWER: Derives unauthorized information by
measuring any physical side channel (such as time sound, power consumption,
electromagnetic radiation, radio waves, and heat)
Python has no native encryption API, so what might you use instead? - ANSWER:
cryptography or pycryptodome packages
When using the high level "recipes layer" API of cryptography, what protocol/class
will you be interacting with? - ANSWER: Fernet
How is a fernet token created? - ANSWER: The Fernet.encrypt method encrypts the
plaintext and then also hashes the ciphertext with HMAC-SHA256.
What class is used in combination with Fernet to implement key rotation? -
ANSWER: MultiFernet class
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller knoowy96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.