Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Secure-Software-Design WGU Secure Software Design (D487) Exam Questions and Answers

Questions 4

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

Options:

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Buy Now
Questions 5

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Buy Now
Questions 6

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

Options:

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Buy Now
Questions 7

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Buy Now
Questions 8

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

Options:

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Buy Now
Questions 9

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

Buy Now
Questions 10

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:

A.

Attack models

B.

Training

C.

Architecture analysis

D.

Code review

Buy Now
Questions 11

Which category classifies identified threats that do not have defenses in place and expose the application to exploits?

Options:

A.

Fully mitigated threat

B.

Threat profile

C.

Unmitigated threats

D.

Partially mitigated threat

Buy Now
Questions 12

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Buy Now
Questions 13

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

Options:

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk

Buy Now
Questions 14

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Buy Now
Questions 15

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

Options:

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

Buy Now
Questions 16

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Buy Now
Questions 17

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Buy Now
Questions 18

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Buy Now
Questions 19

While performing functional testing of the ordering feature in the new product, a tester noticed that the order object was transmitted to the POST endpoint of the API as a human-readable JSON object.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure passwords and private information are not logged

B.

Ensure sensitive transactions can be traced through an audit log

C.

Ensure the contents of authentication cookies are encrypted

D.

Ensure all requests and responses are encrypted

Buy Now
Questions 20

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

Options:

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Buy Now
Questions 21

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.

Privacy compliance report

B.

Remediation report

C.

Security testing reports

D.

Security test execution report

Buy Now
Questions 22

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Buy Now
Questions 23

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

Options:

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Buy Now
Questions 24

Which threat modeling step collects exploitable weaknesses within the product?

Options:

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope

Buy Now
Questions 25

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Buy Now
Questions 26

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

Options:

A.

Load testing

B.

Input validation

C.

Intercept proxy

D.

Reverse engineering

Buy Now
Questions 27

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

Options:

A.

Input Validation

B.

Memory Management

C.

Session Management

D.

Data Protection

Buy Now
Questions 28

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

Options:

A.

Authentication and Password Management

B.

Input Validation

C.

System Configuration

D.

Error Handling and Logging

Buy Now
Questions 29

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Buy Now
Questions 30

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

Options:

A.

Daily Scrum

B.

Sprint Planning

C.

Sprint Retrospective

D.

Sprint Review

Buy Now
Questions 31

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Buy Now
Questions 32

What is a best practice of secure coding?

Options:

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Buy Now
Questions 33

Which type of threat exists when an attacker can intercept and manipulate form data after the user clicks the save button but before the request is posted to the API?

Options:

A.

Elevation of privilege

B.

Spoofing

C.

Tampering

D.

Information disclosure

Buy Now
Exam Name: WGU Secure Software Design (D487) Exam
Last Update: Apr 2, 2025
Questions: 113
Secure-Software-Design pdf

Secure-Software-Design PDF

$25.5  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$30  $99.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$40.5  $134.99