WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam
Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?
The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.
Which OpenSAMM business function is being assessed?
A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?
The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.
Which type of security development lifecycle (SDL) tool was likely being used?
Which secure software design principle assumes attackers have the source code and specifications of the product?
A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.
How should the organization remediate this vulnerability?
Which security assessment deliverable identities possible security vulnerabilities in the product?
The software security team is using an automation tool that generates random data to input into every field in the new product and track results.
Which security testing technique is being used?
While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.
How should existing security controls be adjusted to prevent this in the future?
The security team is identifying technical resources that will be needed to perform the final product security review.
Which step of the final product security review process are they in?