WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam
The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.
Which security testing technique is being used?
Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.
Which phase of the software development lifecycle (SDLC) is being described?
What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?
What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?
What is a best practice of secure coding?
The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.
Which security testing technique is being used?
Which category classifies identified threats that have defenses in place and do not expose the application to exploits?
A security architect is creating a data flow diagram and draws an arrow between two circles.
What does the arrow represent?
What are the eight phases of the software development lifecycle (SDLC)?
The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.
Which design and development deliverable did the team prepare?