Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C836 WGU COMPLETE | Study Guide |2025/2026

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
08-10-2025
Written in
2025/2026

Exam of 8 pages for the course WGU C836 at WGU C836 (C836 WGU COMPLETE.)

Institution
Course

Content preview

C836 WGU COMPLETE Study Guide


to set a limit on the amount of data we expect to receive to set
aside storage for that data
bounds checking *required in most programming languages

* prevents buffer overflows
A type of software development vulnerability that occurs when
multiple processes or multiple threads within a process control
race conditions or share access to a particular resource, and the correct
handling of that resource depends on the proper ordering or
timing of transactions
a type of attack that can occur when we fail to validate the input
input validation
to our applications or take steps to filter out unexpected or
undesirable content
a type of input validation attacks in which certain print functions

format string attack within a programming language can be used to manipulate or view
the internal memory of an application
A type of attack that can occur when we fail to use strong
authentication attack
authentication mechanisms for our applications
A type of attack that can occur when we fail to use authorization
authorization attack
best practices for our applications
A type of attack that can occur when we fail to properly design our
cryptographic attack
security mechanisms when implementing cryptographic controls in
our applications
A type of attack that takes advantage of weaknesses in the

client-side attack software loaded on client machines or one that uses social
engineering techniques to trick us into going along with the
attack
an attack carried out by placing code in the form of a scripting
XSS (Cross Site Scripting)
language into a web page or other media that is interpreted by
a client browser

, an attack in which the attacker places a link on a web page in

XSRF (cross-site request forgery) such a way that it will be automatically executed to initiate a
particular activity on another web page or application where
the user is currently authenticated
An attack that takes advantage of the graphical display capabilities
clickjacking
of our browser to trick us into clicking on something we might
not otherwise
A type of attack on the web server that can target vulnerabilities

server-side attack such as lack of input validation, improper or inadequate
permissions, or extraneous files left on the server from the
development process
Protocol issues, unauthenticated Name the 4 main categories of database security issues
access, arbitrary code execution,
and privilege escalation
A type of tool that analyzes web pages or web-based applications

web application analysis tool and searches for common flaws such as XSS or SQL injection flaws,
and improperly set permissions, extraneous files, outdated
software versions, and many more such items
unauthenticated flaws in network protocols, authenticated flaws in
protocol issues
network protocols, flaws in authentication protocols
An attack that exploits an applications vulnerability into allowing

arbitrary code execution the attacker to execute commands on a user's computer.
* arbitrary code execution in intrinsic or securable SQL elements
An attack that exploits a vulnerability in software to gain access to

Privilege Escalation resources that the user normally would be restricted from
accessing.
* via SQL injection or local issues
a security best practice for all software
validating user inputs
* the most effective way of mitigating SQL injection attacks
A web server analysis tool that performs checks for many common

Nikto (and Wikto) server-side vulnerabilities & creates an index of all the files and
directories it can see on the target web server (a process known
as spidering)
A well-known GUI web analysis tool that offers a free and
burp suite
professional version; the pro version includes advanced tools for
conducting more in-depth attacks
A type of tool that works by bombarding our applications with all

fuzzer manner of data and inputs from a wide variety of sources, in the
hope that we can cause the application to fail or to perform in

Written for

Course

Document information

Uploaded on
October 8, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
2 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions