Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Secure-Software-Design Exam Dumps - WGU Secure Software Design (D487, KEO1) Exam

Searching for workable clues to ace the WGU Secure-Software-Design Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Secure-Software-Design PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

A.

Personal information retention requirements

B.

User controls requirements

C.

Third party requirements

D.

Data integrity requirements

Full Access
Question # 10

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements

Full Access
Question # 11

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

A.

Information security

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 12

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure no sensitive information is stored in plain text in cookies

B.

Ensure user sessions timeout after short intervals

C.

Ensure role-based access control is enforced for access to all resources

D.

Ensure strong password policies are enforced

Full Access
Question # 13

Which mitigation technique is used to fight against an identity spoofing threat?

A.

Require user authorization

B.

Filtering

C.

Audit trails

D.

Encryption

Full Access
Question # 14

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

A.

Access control

B.

Data protection

C.

Input validation

D.

Authentication

Full Access
Question # 15

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

A.

Vulnerability scan

B.

Final security review

C.

Open-source licensing review

D.

Final privacy review

Full Access
Question # 16

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Full Access
Go to page: