Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Exam Practice Test

WGU Secure Software Design (D487, KEO1) Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Question 2

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

Options:

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

Question 3

What is a countermeasure to the web application security frame (ASF) authentication threat category?

Options:

A.

Role-based access controls restrict access

B.

Credentials and tokens are encrypted.

C.

Cookies have expiration timestamps.

D.

Sensitive information is scrubbed from error messages

Question 4

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

Options:

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

Question 5

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Question 6

What is a best practice of secure coding?

Options:

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Question 7

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

Options:

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Question 8

What refers to the review of software source code by developers other than the original coders to try to identify oversights, mistakes, assumptions, a lack of knowledge, or even experience?

Options:

A.

User acceptance testing

B.

Manual peer review

C.

Fault injection

D.

Dynamic code review

Question 9

A potential threat was discovered during vulnerability testing when an environment configuration file was found that contained the database username and password stored in plain text.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Enforce Role-Based Authorization

B.

Encrypt Secrets in Storage and Transit

C.

Ensure Strong Password Policies are in Effect

D.

Validate All User Input

Question 10

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

Options:

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Question 11

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

Options:

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Question 12

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

Options:

A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Question 13

Which security assessment deliverable identifies possible security vulnerabilities in the product?

Options:

A.

Threat profile

B.

Metrics template

C.

SDL project outline

D.

List of third-party software

Question 14

A software security team recently completed an internal assessment of the company's security assurance program. The team delivered a set of scorecards to leadership along with proposed changes designed to improve low-scoring governance, development, and deployment functions.

Which software security maturity model did the team use?

Options:

A.

Building Security In Maturity Model (BSIMM)

B.

Open Web Application Security Project (OWASP) Open Software Assurance Maturity Model (SAMM)

C.

U.S. Department of Homeland Security Software Assurance Program

D.

International Organization for Standardization ISO/IEC 27034

Question 15

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Question 16

What are the three primary goals of the secure software development process?

Options:

A.

Performance, reliability, and maintainability

B.

Cost, speed to market, and profitability

C.

Redundancy, scalability, and portability

D.

Confidentiality, integrity, and availability

Question 17

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Question 18

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

Options:

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Question 19

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

Options:

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Question 20

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.

Open Design

B.

Psychological Acceptability

C.

Total Mediation

D.

Separation of Privileges

Question 21

An individual is developing a software application that has a back-end database and is concerned that a malicious user may run the following SOL query to pull information about all accounts from the database:

Which technique should be used to detect this vulnerability without running the source codes?

Options:

A.

Dynamic analysis

B.

Cross-site scripting

C.

Static analysis

D.

Fuzz testing

Question 22

Which threat modeling step collects exploitable weaknesses within the product?

Options:

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope

Question 23

Which DREAD category is based on how easily a threat exploit can be found?

Options:

A.

Damage Potential

B.

Affected Users

C.

Discoverability

D.

Reproducibility

Question 24

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Question 25

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Question 26

Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Question 27

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.

Privacy compliance report

B.

Remediation report

C.

Security testing reports

D.

Security test execution report

Question 28

What are the eight phases of the software development lifecycle (SDLC)?

Options:

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

Question 29

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Question 30

Which security assessment deliverable defines measures that can be periodically reported to management?

Options:

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Question 31

The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.

Which security testing technique is being used?

Options:

A.

Automated vulnerability scanning

B.

Penetration testing

C.

Properly-based testing

D.

Source-code analysis

Question 32

Which software development model starts by specifying and implementing just a part of the software, which is then reviewed and identifies further requirements that are implemented by repeating the cycle?

Options:

A.

Iterative

B.

Implementation

C.

Waterfall

D.

Code and fix

Question 33

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

Options:

A.

Access control

B.

Data protection

C.

Session management

D.

Communication security

Question 34

The software security team is using an automation tool that generates random data to input into every field in the new product and track results.

Which security testing technique is being used?

Options:

A.

Black-Box Debugging

B.

Fuzz Testing

C.

Binary Code Analysis

D.

Byte Code Analysis

Question 35

A public library needs to implement security control on publicly used computers to prevent illegal downloads.

Which security control would prevent this threat?

Options:

A.

Nonrepudiation

B.

Authentication

C.

Integrity

D.

Availability