Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Secure-Software-Design Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 24

What are the eight phases of the software development lifecycle (SDLC)?

Options:

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

Buy Now
Question # 25

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Buy Now
Question # 26

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Medium severity

B.

Critical severity

C.

Low severity

D.

High severity

Buy Now
Question # 27

Which secure coding best practice says to require authentication before allowing any files to be uploaded and to limit the types of files to only those needed for the business purpose?

Options:

A.

File management

B.

Communication security

C.

Data protection

D.

Memory management

Buy Now
Question # 28

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

Options:

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Buy Now
Question # 29

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Buy Now
Question # 30

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

Options:

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Buy Now
Question # 31

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Buy Now
Question # 32

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Buy Now
Question # 33

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

Options:

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Buy Now
Exam Name: WGU Secure Software Design (D487, KEO1) Exam
Last Update: Sep 13, 2025
Questions: 118
Secure-Software-Design pdf

Secure-Software-Design PDF

$25.5  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$28.5  $94.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$40.5  $134.99