Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Questions and Answers

Questions 4

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

Options:

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

Buy Now
Questions 5

Which type of threat exists when an attacker can intercept and manipulate form data after the user clicks the save button but before the request is posted to the API?

Options:

A.

Elevation of privilege

B.

Spoofing

C.

Tampering

D.

Information disclosure

Buy Now
Questions 6

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

Options:

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

Buy Now
Questions 7

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:

A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

Buy Now
Questions 8

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Buy Now
Questions 9

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

Options:

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Buy Now
Questions 10

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

Options:

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Buy Now
Questions 11

An individual is developing a software application that has a back-end database and is concerned that a malicious user may run the following SOL query to pull information about all accounts from the database:

Which technique should be used to detect this vulnerability without running the source codes?

Options:

A.

Dynamic analysis

B.

Cross-site scripting

C.

Static analysis

D.

Fuzz testing

Buy Now
Questions 12

A potential threat was discovered during vulnerability testing when an environment configuration file was found that contained the database username and password stored in plain text.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Enforce Role-Based Authorization

B.

Encrypt Secrets in Storage and Transit

C.

Ensure Strong Password Policies are in Effect

D.

Validate All User Input

Buy Now
Questions 13

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Buy Now
Questions 14

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Buy Now
Questions 15

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

Options:

A.

Updated threat modeling artifacts

B.

Security test plans

C.

Privacy implementation assessment results

D.

Design security review

Buy Now
Questions 16

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Buy Now
Questions 17

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

Options:

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Buy Now
Questions 18

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Buy Now
Questions 19

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

Options:

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Buy Now
Questions 20

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Buy Now
Questions 21

Which threat modeling step identifies the assets that need to be protected?

Options:

A.

Set the Scope

B.

Analyze the Target

C.

Rate Threats

D.

Identify and Document Threats

Buy Now
Questions 22

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.

Fuzzing

B.

Static analysis

C.

Dynamic analysis

D.

Bugtraq

Buy Now
Questions 23

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

Buy Now
Questions 24

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

Options:

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Buy Now
Questions 25

What is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or distribution to provide confidentiality, integrity, and availability?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Information Security

Buy Now
Questions 26

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

Options:

A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Buy Now
Questions 27

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Buy Now
Questions 28

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Buy Now
Questions 29

Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Buy Now
Questions 30

Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?

Options:

A.

Encryption

B.

Quality of service

C.

Hashes

D.

Run with least privilege

Buy Now
Questions 31

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Buy Now
Questions 32

The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.

Which post-release deliverable is being described?

Options:

A.

Security strategy tor M&A products

B.

Security strategy for legacy code

C.

Post-release certifications

D.

External vulnerability disclosure response process

Buy Now
Questions 33

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Buy Now
Questions 34

The software security team prepared a detailed schedule napping security development lifecycle phases to the type of analysis they will execute.

Which design and development deliverable aid the team prepare?

Options:

A.

Design security review

B.

Updated threat modeling artifacts

C.

Privacy implementation assessment results

D.

Security test plans

Buy Now
Questions 35

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Buy Now
Exam Name: WGU Secure Software Design (D487, KEO1) Exam
Last Update: Aug 17, 2025
Questions: 118
Secure-Software-Design pdf

Secure-Software-Design PDF

$29.75  $84.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$35  $99.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$47.25  $134.99