Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam

Page: 1 / 4
Total 113 questions

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

A.

Property configure acceptable API requests

B.

Enforce role-based authorization

C.

Use API keys to enforce authorization of every request

D.

Ensure audit logs are in place for sensitive transactions

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Which threat modeling step identifies the assets that need to be protected?

A.

Set the Scope

B.

Analyze the Target

C.

Rate Threats

D.

Identify and Document Threats

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the user authentication component of the company's now product. The base score of the vulnerability was 8.3 and changed to 9.4 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

High seventy

B.

Critical severity

C.

Medium severity

D.

Low seventy

Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages