Easter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Secure-Software-Design WGU Secure Software Design (D487) Exam Questions and Answers

Questions 4

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

Options:

A.

Input Validation

B.

Memory Management

C.

Session Management

D.

Data Protection

Buy Now
Questions 5

What is a best practice of secure coding?

Options:

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Buy Now
Questions 6

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

Options:

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Buy Now
Questions 7

Which DREAD category is based on how easily a threat exploit can be found?

Options:

A.

Damage Potential

B.

Affected Users

C.

Discoverability

D.

Reproducibility

Buy Now
Questions 8

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Buy Now
Questions 9

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Buy Now
Questions 10

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Buy Now
Questions 11

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Buy Now
Questions 12

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Buy Now
Questions 13

Which threat modeling step collects exploitable weaknesses within the product?

Options:

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope

Buy Now
Questions 14

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

Options:

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Buy Now
Questions 15

Which threat modeling step assigns a score to discovered threats?

Options:

A.

Rate Threats

B.

Analyze the Target

C.

Identify and Document Threats

D.

Set the Scope

Buy Now
Questions 16

Which threat modeling approach concentrates on things the organization wants to protect?

Options:

A.

Asset-centric

B.

Server-centric

C.

Attacker-centric

D.

Application-centric

Buy Now
Questions 17

Which type of security analysis is performed using automated software tools while an application is running and is most commonly executed during the testing phase of the SDLC?

Options:

A.

Dynamic analysis

B.

Manual code review

C.

Static analysis

D.

Fuzz testing

Buy Now
Questions 18

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

Options:

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Buy Now
Questions 19

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

Options:

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Buy Now
Questions 20

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the user authentication component of the company's now product. The base score of the vulnerability was 8.3 and changed to 9.4 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

High seventy

B.

Critical severity

C.

Medium severity

D.

Low seventy

Buy Now
Questions 21

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

Options:

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Questions 22

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Buy Now
Questions 23

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.

Access control

B.

System configuration

C.

Communication security

D.

Session management

Buy Now
Questions 24

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

Options:

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Buy Now
Questions 25

A software security team recently completed an internal assessment of the company's security assurance program. The team delivered a set of scorecards to leadership along with proposed changes designed to improve low-scoring governance, development, and deployment functions.

Which software security maturity model did the team use?

Options:

A.

Building Security In Maturity Model (BSIMM)

B.

Open Web Application Security Project (OWASP) Open Software Assurance Maturity Model (SAMM)

C.

U.S. Department of Homeland Security Software Assurance Program

D.

International Organization for Standardization ISO/IEC 27034

Buy Now
Questions 26

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Buy Now
Questions 27

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:

A.

Attack models

B.

Training

C.

Architecture analysis

D.

Code review

Buy Now
Questions 28

Which mitigation technique is used to fight against an identity spoofing threat?

Options:

A.

Require user authorization

B.

Filtering

C.

Audit trails

D.

Encryption

Buy Now
Questions 29

Which threat modeling step identifies the assets that need to be protected?

Options:

A.

Set the Scope

B.

Analyze the Target

C.

Rate Threats

D.

Identify and Document Threats

Buy Now
Questions 30

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Buy Now
Questions 31

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Buy Now
Questions 32

What is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or distribution to provide confidentiality, integrity, and availability?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Information Security

Buy Now
Questions 33

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

Options:

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Buy Now
Exam Name: WGU Secure Software Design (D487) Exam
Last Update: Apr 19, 2025
Questions: 113

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now Secure-Software-Design testing engine

PDF (Q&A)

$36.75  $104.99
buy now Secure-Software-Design pdf