Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with ValidTests

Exam Secure-Software-Design All Questions
Exam Secure-Software-Design Premium Access

View all detail and faqs for the Secure-Software-Design exam

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

Options:

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

Expert Solution
Questions # 32:

Which type of threat exists when an attacker can intercept and manipulate form data after the user clicks the save button but before the request is posted to the API?

Options:

A.

Elevation of privilege

B.

Spoofing

C.

Tampering

D.

Information disclosure

Expert Solution
Questions # 33:

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Expert Solution
Questions # 34:

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Expert Solution
Questions # 35:

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Expert Solution
Questions # 36:

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

Options:

A.

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.

Enforce Strong Password Complexity Standards

C.

Enforce Idle Time-Outs on Session IDs

D.

Ensure All Data Is Encrypted in Transit

Expert Solution
Questions # 37:

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Expert Solution
Questions # 38:

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Expert Solution
Questions # 39:

Which type of manual code review technique is being used when the reviewer starts at an input control and traces its value through the application to each of the value's outputs?

Options:

A.

Risk analysis

B.

Control flow analysis

C.

Data flow analysis

D.

Threat analysis

Expert Solution
Questions # 40:

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

Options:

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions