Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam

Page: 2 / 4
Total 113 questions

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

A.

Load testing

B.

Input validation

C.

Intercept proxy

D.

Reverse engineering

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

What is a best practice of secure coding?

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.

Which security testing technique is being used?

A.

Automated vulnerability scanning

B.

Penetration testing

C.

Properly-based testing

D.

Source-code analysis

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

What are the eight phases of the software development lifecycle (SDLC)?

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review