Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

WGU Secure Software Design (D487, KEO1) Exam

Last Update 19 hours ago Total Questions : 118

The WGU Secure Software Design (D487, KEO1) Exam content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include Secure-Software-Design practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our Secure-Software-Design exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these Secure-Software-Design sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any WGU Secure Software Design (D487, KEO1) Exam practice test comfortably within the allotted time.

Question # 4

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Question # 5

Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?

A.

Dynamic

B.

Black box

C.

Static

D.

White box

Question # 6

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Question # 7

Senior IT staff has determined that a new product will be hosted in the cloud and will support web and mobile users. Developers will need to deliver secure REST services. Android and IOS mobile apps. and a web application. Developers are currently determining how to deliver each part of the overall product.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Maintenance

B.

End of life

C.

Deployment

D.

Design

Question # 8

What are the three primary goals of the secure software development process?

A.

Performance, reliability, and maintainability

B.

Cost, speed to market, and profitability

C.

Redundancy, scalability, and portability

D.

Confidentiality, integrity, and availability

Question # 9

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Question # 10

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Go to page: