Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Secure-Software-Design Exam Dumps - WGU Secure Software Design (D487, KEO1) Exam

Searching for workable clues to ace the WGU Secure-Software-Design Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Secure-Software-Design PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 25

Which security assessment deliverable identities possible security vulnerabilities in the product?

A.

SDL project outline

B.

Metrics template

C.

Threat profile

D.

List of third-party software

Full Access
Question # 26

A software security team recently completed an internal assessment of the company's security assurance program. The team delivered a set of scorecards to leadership along with proposed changes designed to improve low-scoring governance, development, and deployment functions.

Which software security maturity model did the team use?

A.

Building Security In Maturity Model (BSIMM)

B.

Open Web Application Security Project (OWASP) Open Software Assurance Maturity Model (SAMM)

C.

U.S. Department of Homeland Security Software Assurance Program

D.

International Organization for Standardization ISO/IEC 27034

Full Access
Question # 27

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

A.

Ensure passwords are encrypted when stored in persistent data stores

B.

Ensure authentication controls are resistant to brute force attacks

C.

Ensure strong password policies are enforced

D.

Ensure credentials and authentication tokens are encrypted during transit

Full Access
Question # 28

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

A.

Construction

B.

Deployment

C.

Verification

D.

Governance

Full Access
Question # 29

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

A.

Attack models

B.

Training

C.

Architecture analysis

D.

Code review

Full Access
Question # 30

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Full Access
Question # 31

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

A.

Verification

B.

Construction

C.

Deployment

D.

Governance

Full Access
Question # 32

Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?

A.

Privacy

B.

Principle of Least Privilege

C.

Elevation of Privilege

D.

Confidentiality

Full Access
Go to page: