Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with ValidTests

Exam Secure-Software-Design All Questions
Exam Secure-Software-Design Premium Access

View all detail and faqs for the Secure-Software-Design exam

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

What refers to the review of software source code by developers other than the original coders to try to identify oversights, mistakes, assumptions, a lack of knowledge, or even experience?

Options:

A.

User acceptance testing

B.

Manual peer review

C.

Fault injection

D.

Dynamic code review

Expert Solution
Questions # 12:

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Expert Solution
Questions # 13:

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Penetration testing

B.

Policy compliance analysis

C.

Open-source licensing review

D.

Final security review

Expert Solution
Questions # 14:

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

Options:

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Expert Solution
Questions # 15:

Due to positive publicity from the release of the new software product, leadership has decided that it is in the best interests of the company to become ISO 27001 compliant. ISO 27001 is the leading international standard focused on information security.

Which security development life cycle deliverable is being described?

Options:

A.

External vulnerability disclosure response process

B.

Third-party security review

C.

Security strategy for M&A products

D.

Post-release certifications

Expert Solution
Questions # 16:

Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?

Options:

A.

Encryption

B.

Quality of service

C.

Hashes

D.

Run with least privilege

Expert Solution
Questions # 17:

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Expert Solution
Questions # 18:

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

Options:

A.

Input validation

B.

System configuration

C.

Authentication and password management

D.

Error handling and logging

Expert Solution
Questions # 19:

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Expert Solution
Questions # 20:

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions