Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Secure-Software-Design WGU Secure Software Design (D487) Exam Questions and Answers

Questions 4

Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?

Options:

A.

Encryption

B.

Quality of service

C.

Hashes

D.

Run with least privilege

Buy Now
Questions 5

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Buy Now
Questions 6

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Buy Now
Questions 7

Which threat modeling step collects exploitable weaknesses within the product?

Options:

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope

Buy Now
Questions 8

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Buy Now
Questions 9

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

Options:

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Buy Now
Questions 10

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the user authentication component of the company's now product. The base score of the vulnerability was 8.3 and changed to 9.4 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

High seventy

B.

Critical severity

C.

Medium severity

D.

Low seventy

Buy Now
Questions 11

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

Buy Now
Questions 12

An individual is developing a software application that has a back-end database and is concerned that a malicious user may run the following SOL query to pull information about all accounts from the database:

Which technique should be used to detect this vulnerability without running the source codes?

Options:

A.

Dynamic analysis

B.

Cross-site scripting

C.

Static analysis

D.

Fuzz testing

Buy Now
Questions 13

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.

Access control

B.

System configuration

C.

Communication security

D.

Session management

Buy Now
Questions 14

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Buy Now
Questions 15

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Buy Now
Questions 16

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

Options:

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Buy Now
Questions 17

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.

Privacy compliance report

B.

Remediation report

C.

Security testing reports

D.

Security test execution report

Buy Now
Questions 18

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

Options:

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Buy Now
Questions 19

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Buy Now
Questions 20

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

Options:

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Buy Now
Questions 21

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Buy Now
Questions 22

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Buy Now
Questions 23

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Buy Now
Questions 24

Which DREAD category is based on how easily a threat exploit can be found?

Options:

A.

Damage Potential

B.

Affected Users

C.

Discoverability

D.

Reproducibility

Buy Now
Questions 25

Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?

Options:

A.

Session Management

B.

Authentication and Password Management

C.

Data Protection

D.

General Coding Practices

Buy Now
Questions 26

Which threat modeling step assigns a score to discovered threats?

Options:

A.

Rate Threats

B.

Analyze the Target

C.

Identify and Document Threats

D.

Set the Scope

Buy Now
Questions 27

Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?

Options:

A.

Fuzz testing

B.

Dynamic code analysis

C.

Manual code review

D.

Static code analysis

Buy Now
Questions 28

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

Options:

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

Buy Now
Questions 29

Which type of threat exists when an attacker can intercept and manipulate form data after the user clicks the save button but before the request is posted to the API?

Options:

A.

Elevation of privilege

B.

Spoofing

C.

Tampering

D.

Information disclosure

Buy Now
Questions 30

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Buy Now
Questions 31

Company leadership has contracted with a security firm to evaluate the vulnerability of all externally lacing enterprise applications via automated and manual system interactions. Which security testing technique is being used?

Options:

A.

Properly-based-testing

B.

Source-code analysis

C.

Penetration testing

D.

Source-code fault injection

Buy Now
Questions 32

Which type of manual code review technique is being used when the reviewer starts at an input control and traces its value through the application to each of the value's outputs?

Options:

A.

Risk analysis

B.

Control flow analysis

C.

Data flow analysis

D.

Threat analysis

Buy Now
Questions 33

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Buy Now
Exam Name: WGU Secure Software Design (D487) Exam
Last Update: Feb 27, 2025
Questions: 113
Secure-Software-Design pdf

Secure-Software-Design PDF

$29.75  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$35  $99.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$47.25  $134.99