Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with ValidTests

Exam Secure-Software-Design All Questions
Exam Secure-Software-Design Premium Access

View all detail and faqs for the Secure-Software-Design exam

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?

Options:

A.

Dynamic Analysis

B.

Static Analysis

C.

Manual Code Review

D.

Fuzz Testing

Expert Solution
Questions # 22:

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

Options:

A.

Define technical scope

B.

Attack modeling

C.

Define objectives

D.

Application decomposition

Expert Solution
Questions # 23:

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Expert Solution
Questions # 24:

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Expert Solution
Questions # 25:

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding

B.

Input Validation

C.

Access Control

D.

Session Management

Expert Solution
Questions # 26:

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Expert Solution
Questions # 27:

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

Options:

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Expert Solution
Questions # 28:

The software security team is performing security testing for a new software product that is close to production release. They are concentrating on integrations between the new product and database servers, web servers, and web services.

Which security testing technique is being used?

Options:

A.

Fuzz testing

B.

Dynamic code analysis

C.

Binary fault injection

D.

Binary code analysis

Expert Solution
Questions # 29:

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Expert Solution
Questions # 30:

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

Options:

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions