Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Secure Software Design (D487) Exam Secure-Software-Design Questions and answers with ValidTests

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

Options:

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Expert Solution
Questions # 2:

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

Expert Solution
Questions # 3:

Which category classifies identified threats that have defenses in place and do not expose the application to exploits?

Options:

A.

Threat Profile

B.

Fully Mitigated Threat

C.

Partially Mitigated Threat

D.

Unmitigated Threats

Expert Solution
Questions # 4:

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.

Access control

B.

System configuration

C.

Communication security

D.

Session management

Expert Solution
Questions # 5:

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Expert Solution
Questions # 6:

Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.

How should the organization remediate this vulnerability?

Options:

A.

Ensure servers are configured to return as little information as possible to network requests

B.

Ensure servers are regularly updated with the latest security patches

C.

Always uninstall or disable features that are not required

D.

Access to configuration files is limited to administrators

Expert Solution
Questions # 7:

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Expert Solution
Questions # 8:

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.

Privacy compliance report

B.

Remediation report

C.

Security testing reports

D.

Security test execution report

Expert Solution
Questions # 9:

Which secure coding practice uses role-based authentication where department-specific credentials will authorize department-specific functionality?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Expert Solution
Questions # 10:

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions