Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam

Page: 3 / 4
Total 113 questions

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Which secure software design principle assumes attackers have the source code and specifications of the product?

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Which security assessment deliverable identities possible security vulnerabilities in the product?

A.

SDL project outline

B.

Metrics template

C.

Threat profile

D.

List of third-party software

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability