Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Secure-Software-Design Exam Dumps - WGU Secure Software Design (D487, KEO1) Exam

Go to page:
Question # 4

Which threat modeling step assigns a score to discovered threats?

A.

Rate Threats

B.

Analyze the Target

C.

Identify and Document Threats

D.

Set the Scope

Full Access
Question # 5

Which question reflects the security change management component of the change management process?

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Full Access
Question # 6

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Full Access
Question # 7

Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?

A.

Fuzz testing

B.

Dynamic code analysis

C.

Manual code review

D.

Static code analysis

Full Access
Question # 8

Which step in the change management process includes modifying the source code?

A.

Patch management

B.

Installation management

C.

Privacy implementation assessment

D.

Policy compliance analysis

Full Access
Go to page: