Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Secure-Software-Design WGU Secure Software Design (D487) Exam Exam Practice Test

WGU Secure Software Design (D487) Exam Questions and Answers

Question 1

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Question 2

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

Options:

A.

Define technical scope

B.

Attack modeling

C.

Define objectives

D.

Application decomposition

Question 3

A software security team recently completed an internal assessment of the company's security assurance program. The team delivered a set of scorecards to leadership along with proposed changes designed to improve low-scoring governance, development, and deployment functions.

Which software security maturity model did the team use?

Options:

A.

Building Security In Maturity Model (BSIMM)

B.

Open Web Application Security Project (OWASP) Open Software Assurance Maturity Model (SAMM)

C.

U.S. Department of Homeland Security Software Assurance Program

D.

International Organization for Standardization ISO/IEC 27034

Question 4

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

Options:

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Question 5

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Question 6

Which mitigation technique is used to fight against an identity spoofing threat?

Options:

A.

Require user authorization

B.

Filtering

C.

Audit trails

D.

Encryption

Question 7

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

Options:

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Question 8

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

Options:

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Question 9

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the user authentication component of the company's now product. The base score of the vulnerability was 8.3 and changed to 9.4 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

High seventy

B.

Critical severity

C.

Medium severity

D.

Low seventy

Question 10

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Question 11

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

Options:

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Question 12

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

Options:

A.

Daily Scrum

B.

Sprint Planning

C.

Sprint Retrospective

D.

Sprint Review

Question 13

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Question 14

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

Options:

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Question 15

Which security assessment deliverable identities unmanaged code that must be kept up to date throughout the life of the product?

Options:

A.

Threat profile

B.

Metrics template

C.

Product risk profile

D.

List of third-party software

Question 16

What is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or distribution to provide confidentiality, integrity, and availability?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Information Security

Question 17

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

Options:

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Question 18

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

Options:

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Question 19

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

Options:

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Question 20

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Question 21

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Question 22

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

Question 23

What is one of the tour core values of the agile manifesto?

Options:

A.

Communication between team members

B.

Individuals and interactions over processes and tools

C.

Business people and developers must work together daily throughout the project.

D.

Teams should have a dedicated and open workspace.

Question 24

Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.

How should the organization remediate this vulnerability?

Options:

A.

Ensure servers are configured to return as little information as possible to network requests

B.

Ensure servers are regularly updated with the latest security patches

C.

Always uninstall or disable features that are not required

D.

Access to configuration files is limited to administrators

Question 25

Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?

Options:

A.

Dynamic Analysis

B.

Static Analysis

C.

Manual Code Review

D.

Fuzz Testing

Question 26

Which security assessment deliverable defines measures that can be periodically reported to management?

Options:

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Question 27

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Question 28

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Question 29

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Question 30

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:

A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

Question 31

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

Options:

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Question 32

Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Question 33

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

Options:

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk