Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Questions and Answers

Questions 4

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Buy Now
Questions 5

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

Options:

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

Buy Now
Questions 6

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

Buy Now
Questions 7

Which mitigation technique can be used to fight against a denial of service threat?

Options:

A.

Digital signatures

B.

Protect secrets

C.

Timestamps

D.

Throttling

Buy Now
Questions 8

Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?

Options:

A.

Fuzz testing

B.

Dynamic code analysis

C.

Manual code review

D.

Static code analysis

Buy Now
Questions 9

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

Options:

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Buy Now
Questions 10

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

Options:

A.

Access control

B.

Data protection

C.

Session management

D.

Communication security

Buy Now
Questions 11

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

Options:

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Buy Now
Questions 12

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Buy Now
Questions 13

An individual is developing a software application that has a back-end database and is concerned that a malicious user may run the following SOL query to pull information about all accounts from the database:

Secure-Software-Design Question 13

Which technique should be used to detect this vulnerability without running the source codes?

Options:

A.

Dynamic analysis

B.

Cross-site scripting

C.

Static analysis

D.

Fuzz testing

Buy Now
Questions 14

Which secure coding best practice says to require authentication before allowing any files to be uploaded and to limit the types of files to only those needed for the business purpose?

Options:

A.

File management

B.

Communication security

C.

Data protection

D.

Memory management

Buy Now
Questions 15

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

Options:

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Buy Now
Questions 16

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Buy Now
Questions 17

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:

A.

Attack models

B.

Training

C.

Architecture analysis

D.

Code review

Buy Now
Questions 18

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Buy Now
Questions 19

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.

Access control

B.

System configuration

C.

Communication security

D.

Session management

Buy Now
Questions 20

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Buy Now
Questions 21

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

Options:

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Buy Now
Questions 22

Which type of manual code review technique is being used when the reviewer starts at an input control and traces its value through the application to each of the value's outputs?

Options:

A.

Risk analysis

B.

Control flow analysis

C.

Data flow analysis

D.

Threat analysis

Buy Now
Questions 23

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Buy Now
Questions 24

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Buy Now
Questions 25

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

Options:

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Buy Now
Questions 26

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

Options:

A.

Define technical scope

B.

Attack modeling

C.

Define objectives

D.

Application decomposition

Buy Now
Questions 27

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Buy Now
Questions 28

What is the last slop of the SDLOSDL code review process?

Options:

A.

Review for security issues unique to the architecture

B.

Identify security code review objectives

C.

Perform preliminary scan

D.

Review code for security issues

Buy Now
Questions 29

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

Options:

A.

Input validation

B.

System configuration

C.

Authentication and password management

D.

Error handling and logging

Buy Now
Questions 30

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Buy Now
Questions 31

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

Options:

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Buy Now
Questions 32

What is one of the tour core values of the agile manifesto?

Options:

A.

Communication between team members

B.

Individuals and interactions over processes and tools

C.

Business people and developers must work together daily throughout the project.

D.

Teams should have a dedicated and open workspace.

Buy Now
Questions 33

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Buy Now
Questions 34

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Buy Now
Questions 35

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Buy Now
Exam Name: WGU Secure Software Design (D487, KEO1) Exam
Last Update: Jul 30, 2025
Questions: 118

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now Secure-Software-Design testing engine

PDF (Q&A)

$43.57  $124.49
buy now Secure-Software-Design pdf