Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Secure-Software-Design - WGU Secure Software Design (D487, KEO1) Exam

Page: 3 / 4
Total 118 questions

The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.

Which post-release deliverable is being described?

A.

Security strategy tor M&A products

B.

Security strategy for legacy code

C.

Post-release certifications

D.

External vulnerability disclosure response process

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

What is one of the tour core values of the agile manifesto?

A.

Communication between team members

B.

Individuals and interactions over processes and tools

C.

Business people and developers must work together daily throughout the project.

D.

Teams should have a dedicated and open workspace.

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.

Which security testing technique is being used?

A.

Automated vulnerability scanning

B.

Penetration testing

C.

Properly-based testing

D.

Source-code analysis

What is a countermeasure to the web application security frame (ASF) authentication threat category?

A.

Role-based access controls restrict access

B.

Credentials and tokens are encrypted.

C.

Cookies have expiration timestamps.

D.

Sensitive information is scrubbed from error messages

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis