Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Secure-Software-Design - WGU Secure Software Design (D487, KEO1) Exam

Page: 2 / 4
Total 118 questions

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Which privacy impact statement requirement type defines processes to keep personal information updated and accurate?

A.

Access requirements

B.

Collection of personal information requirements

C.

Data integrity requirements

D.

Personal information retention requirements

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.

How should the organization remediate this vulnerability?

A.

Ensure servers are configured to return as little information as possible to network requests

B.

Ensure servers are regularly updated with the latest security patches

C.

Always uninstall or disable features that are not required

D.

Access to configuration files is limited to administrators

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

Which type of manual code review technique is being used when the reviewer starts at an input control and traces its value through the application to each of the value's outputs?

A.

Risk analysis

B.

Control flow analysis

C.

Data flow analysis

D.

Threat analysis

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

A.

Construction

B.

Deployment

C.

Verification

D.

Governance