Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D385 Software Security and Testing Exam 2024 New Latest Updated Version

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
12-09-2024
Written in
2024/2025

WGU D385 Software Security and Testing Exam 2024 New Latest Updated Version How does a server authenticate itself? - ANS-By sending a publickey certificate to the client, which is issued by a certificate authority. The certificate contains the servers public key. What does the Strict-Transport-Security response header do? - ANS-Tells a browser that it should be accessed only via HTTPS. What package is used to send and receive data between other systems? - ANS-The requests package What are HTTP sessions used for? - ANS-To isolate the traffic, context, and and state of each user. How should session ID's be transmitted and why? - ANS-They should be sent and received confidentially over HTTPS (not HTTP) because stealing session IDs is a big area of exploitation. A hijacked session ID looks the same as a legitimate request. What is session sniffing? - ANS-Eavesdroppers steal session IDs over HTTP on websites that use HTTP on unverified users, then when the user is verified they can use the same session ID to hijack the account over HTTPS. What is a cookie? - ANS-A small piece of data used to communicate between the server, website, browser. Communicates the session ID. What does the secure directive do? - ANS-Helps prevent MITM attacks by ensuring a cookie will be transmitted over HTTPS not HTTP, preventing attackers from intercepting the session ID. What does the domain directive do? - ANS-Controls which hosts the browser should send the session ID to. What does the max-age directive do? - ANS-Declares an expiration time for a cookie. What hash function should you use for most general purpose cryptographic hashing? - ANS-SHA-256 What hash function should you consider using for high security environments, though it may have less support? - ANS-SHA3-256 What hash function should you use for very large messages? - ANSBLAKE2 What two hash functions should you avoid, as they're now considered unsecure? - ANS-MD5 and SHA1 What is the difference between hash functions and checksum functions? - ANS-Hash functions have stronger collision resistance, checksums are faster. Checksums are not useful for security. What module do you use for cryptographic hashing in Python? - ANS-hashlib What 3 properties characterize hash functions? - ANS-1. Deterministic behavior 2. Fixed-length hash values 3. Avalanche effect Should you use the secrets or random module for generating secure random numbers? - ANS-secrets What do keyed hash functions do? - ANS-Hash functions using different keys produce different hash values of the same message. Hash functions using the same key produce matching hash values of the same message. Ensures data authentication. What are HMAC functions? - ANS-A generic way to use any ordinary hash function as though it were a keyed hash function, since most hash functions don't support keys natively. Takes 3 inputs: message, key, ordinary cryptographic hash function. What is a timing attack? - ANS-Attacker obtains hints about private information by measuring the time a system takes to perform an operation (ex: string comparison) How can you avoid a timing attack with the hmac module? - ANSYou can use compare_digest in place of ==. This always compares all characters before it returns thus preventing timing attack vulnerabilities. What is a side channel attack? - ANS-Derives unauthorized information by measuring any physical side channel (such as time sound, power consumption, electromagnetic radiation, radio waves, and heat) Python has no native encryption API, so what might you use instead? - ANS-cryptography or pycryptodome packages When using the high level "recipes layer" API of cryptography, what protocol/class will you be interacting with? - ANS-Ferne

Show more Read less
Institution
WGU D385 Software Security And Testing
Course
WGU D385 Software Security and Testing

Content preview

WGU D385 Software Security and
Testing Exam 2024 New Latest
Updated Version
How does a server authenticate itself? - ANS-By sending a public-
key certificate to the client, which is issued by a certificate
authority. The certificate contains the servers public key.


What does the Strict-Transport-Security response header do? -
ANS-Tells a browser that it should be accessed only via HTTPS.

What package is used to send and receive data between other
systems? - ANS-The requests package

What are HTTP sessions used for? - ANS-To isolate the traffic,
context, and and state of each user.

How should session ID's be transmitted and why? - ANS-They
should be sent and received confidentially over HTTPS (not HTTP)
because stealing session IDs is a big area of exploitation. A hijacked
session ID looks the same as a legitimate request.

What is session sniffing? - ANS-Eavesdroppers steal session IDs
over HTTP on websites that use HTTP on unverified users, then when
the user is verified they can use the same session ID to hijack the
account over HTTPS.

What is a cookie? - ANS-A small piece of data used to communicate
between the server, website, browser. Communicates the session
ID.

, What does the secure directive do? - ANS-Helps prevent MITM
attacks by ensuring a cookie will be transmitted over HTTPS not
HTTP, preventing attackers from intercepting the session ID.

What does the domain directive do? - ANS-Controls which hosts the
browser should send the session ID to.

What does the max-age directive do? - ANS-Declares an expiration
time for a cookie.

What hash function should you use for most general purpose
cryptographic hashing? - ANS-SHA-256

What hash function should you consider using for high security
environments, though it may have less support? - ANS-SHA3-256

What hash function should you use for very large messages? - ANS-
BLAKE2

What two hash functions should you avoid, as they're now
considered unsecure? - ANS-MD5 and SHA1

What is the difference between hash functions and checksum
functions? - ANS-Hash functions have stronger collision resistance,
checksums are faster. Checksums are not useful for security.

What module do you use for cryptographic hashing in Python? -
ANS-hashlib

What 3 properties characterize hash functions? - ANS-1.
Deterministic behavior 2. Fixed-length hash values 3. Avalanche
effect

Written for

Institution
WGU D385 Software Security and Testing
Course
WGU D385 Software Security and Testing

Document information

Uploaded on
September 12, 2024
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
laurenjames james
View profile
Follow You need to be logged in order to follow users or courses
Sold
91
Member since
2 year
Number of followers
16
Documents
1532
Last sold
1 day ago
LaurenJames

Welcome to My Stuvia Page! I'm, a dedicated medical doctor (MD) with a passion for helping students excel in their exams. With my extensive experience in the medical field, I provide comprehensive support and effective study techniques to ensure academic success. My unique approach combines medical knowledge with practical strategies, making me an invaluable resource for students aiming for top performance. Discover my proven methods and start your journey to academic excellence with me on Stuvia today! Hi there! I'm Lauren James, and I'm here to provide high-quality study materials to help you succeed. With a focus on clarity and usefulness, my notes are designed to make your studying easier and more efficient. If you ever need assistance or have any questions, feel free to reach out. Let's achieve your academic goals together! Contact me via MESSAGE for any assisstance. Good luck! Simple well-researched education material for you. Please rate my work and write a review GOOD LUCK IN YOUR EXAM! Feel free to tweak it based on your style!

Read more Read less
3.6

12 reviews

5
5
4
2
3
2
2
1
1
2

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions