Special Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Secure-Software-Design WGU Secure Software Design (D487) Exam Questions and Answers

Questions 4

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Buy Now
Questions 5

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

Options:

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

Buy Now
Questions 6

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Buy Now
Questions 7

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

Options:

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Buy Now
Questions 8

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Buy Now
Questions 9

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

Options:

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Buy Now
Questions 10

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Buy Now
Questions 11

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Buy Now
Questions 12

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Buy Now
Questions 13

The software security team is performing security testing for a new software product that is close to production release. They are concentrating on integrations between the new product and database servers, web servers, and web services.

Which security testing technique is being used?

Options:

A.

Fuzz testing

B.

Dynamic code analysis

C.

Binary fault injection

D.

Binary code analysis

Buy Now
Questions 14

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

Options:

A.

Daily Scrum

B.

Sprint Planning

C.

Sprint Retrospective

D.

Sprint Review

Buy Now
Questions 15

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

Options:

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

Buy Now
Questions 16

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Buy Now
Questions 17

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Buy Now
Questions 18

Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?

Options:

A.

Access requirements

B.

Collection of personal information requirements

C.

Data integrity requirements

D.

Personal information retention requirements

Buy Now
Questions 19

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Buy Now
Questions 20

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Buy Now
Questions 21

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

Options:

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Buy Now
Questions 22

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

Options:

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

Buy Now
Questions 23

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

Options:

A.

Access control

B.

Data protection

C.

Session management

D.

Communication security

Buy Now
Questions 24

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

Options:

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk

Buy Now
Questions 25

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Buy Now
Questions 26

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Buy Now
Questions 27

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Buy Now
Questions 28

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

Buy Now
Questions 29

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Buy Now
Questions 30

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

Options:

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Buy Now
Questions 31

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

Options:

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Buy Now
Questions 32

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Buy Now
Questions 33

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Buy Now
Exam Name: WGU Secure Software Design (D487) Exam
Last Update: Mar 29, 2025
Questions: 113

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now Secure-Software-Design testing engine

PDF (Q&A)

$31.5  $104.99
buy now Secure-Software-Design pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Apr 2025