Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > WGU > Courses and Certificates > Secure-Software-Design

Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Question and Answers

Question # 4

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Full Access
Question # 5

Which secure coding practice uses role-based authentication where department-specific credentials will authorize department-specific functionality?

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Full Access
Question # 6

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

A.

Fully Mitigated Threat

B.

Unmitigated Threats

C.

Threat Profile

D.

Partially Mitigated Threat

Full Access
Question # 7

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Medium severity

B.

Critical severity

C.

Low severity

D.

High severity

Full Access
Question # 8

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

A.

Attack modeling

B.

Define technical scope

C.

Define objectives

D.

Risk and impact analysis

Full Access
Question # 9

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Full Access
Question # 10

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

A.

Lock a User Account After Multiple Failed Authentication Attempts

B.

Ensure All Authorization Requests Are Logged

C.

Implement Multifactor Authentication

D.

Implement Role-Based Authorization

Full Access
Question # 11

Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?

A.

Privacy

B.

Principle of Least Privilege

C.

Elevation of Privilege

D.

Confidentiality

Full Access
Question # 12

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Full Access
Question # 13

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Full Access
Question # 14

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Full Access
Question # 15

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Critical severity

B.

High severity

C.

Low severity

D.

Medium severity

Full Access
Question # 16

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Full Access
Question # 17

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Full Access
Question # 18

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Full Access
Question # 19

The product team has been tasked with updating the user interface (UI). They will change the layout and also add restrictions to field lengths and what data will be accepted.

Which secure coding practice is this?

A.

Input validation

B.

Access control

C.

Communication security

D.

Data protection

Full Access
Question # 20

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

A.

Source-Code Fault Injection

B.

Dynamic Code Analysis

C.

Fuzz Testing

D.

Binary Fault Injection

Full Access
Question # 21

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

A.

Security Strategy for Legacy Code

B.

Post-Release Certifications

C.

Third-Party Security Review

D.

External Vulnerability Disclosure Response Process

Full Access
Question # 22

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Full Access
Question # 23

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Full Access
Question # 24

Which type of threat exists when an attacker can intercept and manipulate form data after the user clicks the save button but before the request is posted to the API?

A.

Elevation of privilege

B.

Spoofing

C.

Tampering

D.

Information disclosure

Full Access
Question # 25

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Full Access
Question # 26

Which design and development deliverable contains the results of each type of evaluation that was performed and the type and number of vulnerabilities discovered?

A.

Security test execution report

B.

Security testing reports

C.

Privacy compliance report

D.

Remediation report

Full Access
Question # 27

Which mitigation technique can be used to fight against a denial of service threat?

A.

Digital signatures

B.

Protect secrets

C.

Timestamps

D.

Throttling

Full Access
Question # 28

What is the last slop of the SDLOSDL code review process?

A.

Review for security issues unique to the architecture

B.

Identify security code review objectives

C.

Perform preliminary scan

D.

Review code for security issues

Full Access
Question # 29

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

A.

Access control

B.

Data protection

C.

Session management

D.

Communication security

Full Access
Question # 30

Which threat modeling approach concentrates on things the organization wants to protect?

A.

Asset-centric

B.

Server-centric

C.

Attacker-centric

D.

Application-centric

Full Access
Question # 31

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Full Access
Question # 32

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

A.

Static Analysis

B.

Fuzz Testing

C.

Dynamic Analysis

D.

Manual Code Review

Full Access
Question # 33

Which architecture deliverable identifies the organization's tolerance to security issues and how the organization plans to react if a security issue occurs?

A.

Threat Modeling Artifacts

B.

Risk Mitigation Plan

C.

Business Requirements

D.

Policy Compliance Analysis

Full Access
Question # 34

Which category classifies identified threats that do not have defenses in place and expose the application to exploits?

A.

Fully mitigated threat

B.

Threat profile

C.

Unmitigated threats

D.

Partially mitigated threat

Full Access
Question # 35

While performing functional testing of the ordering feature in the new product, a tester noticed that the order object was transmitted to the POST endpoint of the API as a human-readable JSON object.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords and private information are not logged

B.

Ensure sensitive transactions can be traced through an audit log

C.

Ensure the contents of authentication cookies are encrypted

D.

Ensure all requests and responses are encrypted

Full Access