Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Questions and Answers

Questions 4

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

Options:

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Buy Now
Questions 5

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Buy Now
Questions 6

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Penetration testing

B.

Policy compliance analysis

C.

Open-source licensing review

D.

Final security review

Buy Now
Questions 7

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Buy Now
Questions 8

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Buy Now
Questions 9

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Buy Now
Questions 10

Developers have finished coding, and changes have been peer-reviewed. Features have been deployed to a pre-production environment so that analysts may verify that the product is working as expected.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

Requirements

B.

Design

C.

Testing

D.

Deployment

Buy Now
Questions 11

Which secure coding best practice says to require authentication before allowing any files to be uploaded and to limit the types of files to only those needed for the business purpose?

Options:

A.

File management

B.

Communication security

C.

Data protection

D.

Memory management

Buy Now
Questions 12

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

Buy Now
Questions 13

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Buy Now
Questions 14

Which security assessment deliverable identities possible security vulnerabilities in the product?

Options:

A.

SDL project outline

B.

Metrics template

C.

Threat profile

D.

List of third-party software

Buy Now
Questions 15

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Buy Now
Questions 16

Which type of manual code review technique is being used when the reviewer starts at an input control and traces its value through the application to each of the value's outputs?

Options:

A.

Risk analysis

B.

Control flow analysis

C.

Data flow analysis

D.

Threat analysis

Buy Now
Questions 17

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Buy Now
Questions 18

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

Options:

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Buy Now
Questions 19

Which secure coding practice uses role-based authentication where department-specific credentials will authorize department-specific functionality?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Buy Now
Questions 20

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Buy Now
Questions 21

Which software development model starts by specifying and implementing just a part of the software, which is then reviewed and identifies further requirements that are implemented by repeating the cycle?

Options:

A.

Iterative

B.

Implementation

C.

Waterfall

D.

Code and fix

Buy Now
Questions 22

Due to positive publicity from the release of the new software product, leadership has decided that it is in the best interests of the company to become ISO 27001 compliant. ISO 27001 is the leading international standard focused on information security.

Which security development life cycle deliverable is being described?

Options:

A.

External vulnerability disclosure response process

B.

Third-party security review

C.

Security strategy for M&A products

D.

Post-release certifications

Buy Now
Questions 23

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

Options:

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Buy Now
Questions 24

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Buy Now
Questions 25

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Property configure acceptable API requests

B.

Enforce role-based authorization

C.

Use API keys to enforce authorization of every request

D.

Ensure audit logs are in place for sensitive transactions

Buy Now
Questions 26

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

Buy Now
Questions 27

What are the three primary goals of the secure software development process?

Options:

A.

Performance, reliability, and maintainability

B.

Cost, speed to market, and profitability

C.

Redundancy, scalability, and portability

D.

Confidentiality, integrity, and availability

Buy Now
Questions 28

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Buy Now
Questions 29

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:

A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

Buy Now
Questions 30

What refers to the review of software source code by developers other than the original coders to try to identify oversights, mistakes, assumptions, a lack of knowledge, or even experience?

Options:

A.

User acceptance testing

B.

Manual peer review

C.

Fault injection

D.

Dynamic code review

Buy Now
Questions 31

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Buy Now
Questions 32

What are the eight phases of the software development lifecycle (SDLC)?

Options:

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

Buy Now
Questions 33

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.

Release and Ship

B.

Identify Feature Eligibility

C.

Evaluate and Plan for Remediation

D.

Assess Resource Availability

Buy Now
Questions 34

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

Options:

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Questions 35

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Buy Now
Exam Name: WGU Secure Software Design (D487, KEO1) Exam
Last Update: Aug 17, 2025
Questions: 118
Secure-Software-Design pdf

Secure-Software-Design PDF

$29.75  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$35  $99.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$47.25  $134.99