WGU Secure-Software-Design - WGU Secure Software Design (D487, KEO1) Exam
The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.
Which post-release deliverable is being described?
A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.
Which phase of the software development lifecycle (SDLC) is being described?
Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?
What is one of the tour core values of the agile manifesto?
The software security team is using an automation tool that generates random data to input into every field in the new product and track results.
Which security testing technique is being used?
The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.
Which design and development deliverable did the team prepare?
Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?
The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.
Which security testing technique is being used?
What is a countermeasure to the web application security frame (ASF) authentication threat category?
In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?