Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Secure-Software-Design Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 4

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

Options:

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Buy Now
Question # 5

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

Options:

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Buy Now
Question # 6

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Buy Now
Question # 7

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

Buy Now
Question # 8

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

Options:

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Buy Now
Question # 9

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Buy Now
Question # 10

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Buy Now
Question # 11

What is one of the tour core values of the agile manifesto?

Options:

A.

Communication between team members

B.

Individuals and interactions over processes and tools

C.

Business people and developers must work together daily throughout the project.

D.

Teams should have a dedicated and open workspace.

Buy Now
Question # 12

Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?

Options:

A.

Session Management

B.

Authentication and Password Management

C.

Data Protection

D.

General Coding Practices

Buy Now
Question # 13

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Buy Now
Exam Name: WGU Secure Software Design (D487, KEO1) Exam
Last Update: Sep 14, 2025
Questions: 118
Secure-Software-Design pdf

Secure-Software-Design PDF

$25.5  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$28.5  $94.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$40.5  $134.99