Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C706 Secure Software Design Study Guide Questions and Answers Latest Update Assured Success..

Beoordeling
-
Verkocht
-
Pagina's
21
Cijfer
A
Geüpload op
02-12-2023
Geschreven in
2023/2024

WGU C706 Secure Software Design Study Guide Questions and Answers Latest Update Assured Success..docx

Instelling
Vak

Voorbeeld van de inhoud

WGU C706 Secure Software Design Study Guide
Questions and Answers 2022-2023 Latest Update
Assured Success.
1. Confidentiality - ✅✅Information is not made available or disclosed to
unauthorized individuals, entities, or processes. Ensures unauthorized
persons are not able to read private and sensitive data. It is achieved
through cryptography.


2. Integrity - ✅✅Ensures unauthorized persons or channels are not able to
modify the data. It is accomplished through the use of a message digest or
digital signatures.


3. Availability - ✅✅The computing systems used to store and process
information, the security controls used to protect information, and the
communication channels used to access information must be functioning
correctly. Ensures system remains operational even in the event of a failure
or an attack. It is achieved by providing redundancy or fault tolerance for a
failure of a system and its components.


4. Ensure Confidentiality - ✅✅Public Key Infrastructure (PKI) and
Cryptography/Encryption


5. Ensure Availability - ✅✅Offsite back-up and Redundancy


6. Ensure Integrity - ✅✅Hashing, Message Digest (MD5), non repudiation
and digital signatures




P a g e 1 | 21

,7. Software Architect - ✅✅Moves analysis to implementation and analyzes
the requirements and use cases as activities to perform as part of the
development process; can also develop class diagrams.


8. Security Practitioner Roles - ✅✅Release Manager,
9. Architect, Developer, Business Analyst/Project Manager


10.Release Manager - ✅✅Deployment


11.Architect - ✅✅Design


12.Developer - ✅✅Coding


13.Business Analyst/Project Manager - ✅✅Requirements Gathering


14.Red Team - ✅✅Teams of people familiar with the infrastructure of the
company and the languages of the software being developed. Their mission
is to kill the system as the developers build it.


15.Static Analysis - ✅✅A method of computer program debugging that is
done by examining the code without executing the program. The process
provides an understanding of the code structure, and can help to ensure
that the code adheres to industry standards. It's also referred as code
review.


16.MD5 Hash - ✅✅A widely used hash function producing a 128-bit hash
value. Initially designed to be used as a cryptographic hash function, it has
been found to suffer from extensive vulnerabilities. It can still be used as a
checksum to verify data integrity, but only against unintentional corruption.
P a g e 2 | 21

, 17.SHA-256 (Secure Hash Algorithm) - ✅✅One of a number of cryptographic
hash functions. A cryptographic hash is like a signature for a text or a data
file. Generates an almost-unique, fixed size 32-byte
18.(32 X 8) hash. Hash is a one-way function - it cannot be decrypted.


19.Advanced Encryption Standard (AES) - ✅✅A symmetric encryption
algorithm. The algorithm was developed by two Belgian cryptographers
Joan Daemen and Vincent Rijmen. Designed to be efficient in both
hardware and software, and supports a block length of 128 bits and key
lengths of 128, 192, and 256 bits.


20.Algorithms used to verify integrity - ✅✅MD5 Hash, SHA-256


21.Algorithm used to verify confidentiality - ✅✅Advanced Encryption
Standard (AES)


22.Stochastic - ✅✅unintentional or accidental


23.safety-relevant faults - ✅✅stochastic (i.e., unintentional or accidental)


24.security-relevant faults - ✅✅"Sponsored," i.e., intentionally created and
activated through conscious and intentional human agency.


25.Fuzz Testing - ✅✅Used to see if the system has solid exception handling to
the input it receives. Is the use of malformed or random input into a system
in order to intentionally produce failure. This is a very easy process of
feeding garbage to the system when it expects a formatted input, and it is
always a good idea to feed as much garbage as possible to an input field.

P a g e 3 | 21

Geschreven voor

Vak

Documentinformatie

Geüpload op
2 december 2023
Aantal pagina's
21
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Onlineexam Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
456
Lid sinds
5 jaar
Aantal volgers
352
Documenten
14399
Laatst verkocht
2 dagen geleden
Concrete study materials for exams,study guides,notes,summaries and study quizes.

Hello , I am very friendly and experienced tutor dedicated to my teaching work. If you need any kind of help then you can contact me with any questions about your course .I can help you with everything - tests, quizzes, exams, db threads and so on. Just ask me if you want to get an A on your courses. Anyway Welcome to Tutoring with Experience and Enthusiasm! I am thrilled to have the opportunity to help you with best study guides and assignments. Be prepared.

Lees meer Lees minder
4.3

79 beoordelingen

5
52
4
12
3
4
2
5
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen