Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Secure-Software-Design Exam Dumps - WGU Secure Software Design (D487, KEO1) Exam

Searching for workable clues to ace the WGU Secure-Software-Design Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Secure-Software-Design PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Full Access
Question # 18

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Full Access
Question # 19

Which category classifies identified threats that do not have defenses in place and expose the application to exploits?

A.

Fully mitigated threat

B.

Threat profile

C.

Unmitigated threats

D.

Partially mitigated threat

Full Access
Question # 20

Which DREAD category is based on how easily a threat exploit can be found?

A.

Damage Potential

B.

Affected Users

C.

Discoverability

D.

Reproducibility

Full Access
Question # 21

Credit card numbers are encrypted when stored in the database but are automatically decrypted when data is fetched. The testing tool intercepted the GET response, and testers were able to view credit card numbers as clear text.

How should the organization remediate this vulnerability?

A.

Never cache sensitive data

B.

Ensure there is an audit trail for all sensitive transactions

C.

Ensure all data in transit is encrypted

D.

Enforce role-based authorization controls in all application layers

Full Access
Question # 22

What are the eight phases of the software development lifecycle (SDLC)?

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance

B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life

C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy

D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain

Full Access
Question # 23

What is a countermeasure to the web application security frame (ASF) authentication threat category?

A.

Role-based access controls restrict access

B.

Credentials and tokens are encrypted.

C.

Cookies have expiration timestamps.

D.

Sensitive information is scrubbed from error messages

Full Access
Question # 24

Which secure coding practice uses role-based authentication where department-specific credentials will authorize department-specific functionality?

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Full Access
Go to page: