Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

WGU Secure Software Design (D487) Exam Question and Answers

WGU Secure Software Design (D487) Exam

Last Update Jul 10, 2025
Total Questions : 113

We are offering FREE Secure-Software-Design WGU exam questions. All you do is to just go and sign up. Give your details, prepare Secure-Software-Design free exam questions and then go for complete pool of WGU Secure Software Design (D487) Exam test questions that will help you more.

Secure-Software-Design pdf

Secure-Software-Design PDF

$42  $104.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$50  $124.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$66  $164.99
Questions 1

The security team is identifying technical resources that will be needed to perform the final product security review.

Which step of the final product security review process are they in?

Options:

A.  

Release and Ship

B.  

Identify Feature Eligibility

C.  

Evaluate and Plan for Remediation

D.  

Assess Resource Availability

Discussion 0
Questions 2

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.  

Attack models

B.  

Code review

C.  

Architecture analysis

D.  

Penetration testing

Discussion 0
Questions 3

What are the three primary goals of the secure software development process?

Options:

A.  

Performance, reliability, and maintainability

B.  

Cost, speed to market, and profitability

C.  

Redundancy, scalability, and portability

D.  

Confidentiality, integrity, and availability

Discussion 0
Questions 4

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.  

Privacy compliance report

B.  

Remediation report

C.  

Security testing reports

D.  

Security test execution report

Discussion 0
Questions 5

A recent security review has identified an aging credential recovery/forgotten password component that emails temporary passwords to users who claim to have forgotten their application password.

How should the organization remediate this vulnerability?

Options:

A.  

Lock a User Account After Multiple Failed Authentication Attempts

B.  

Ensure All Authorization Requests Are Logged

C.  

Implement Multifactor Authentication

D.  

Implement Role-Based Authorization

Discussion 0
Questions 6

The security software team has cloned the source code repository of the new software product so they can perform vulnerability testing by modifying or adding small snippets of code to see if they can cause unexpected behavior and application failure.

Which security testing technique is being used?

Options:

A.  

Source-Code Fault Injection

B.  

Dynamic Code Analysis

C.  

Fuzz Testing

D.  

Binary Fault Injection

Discussion 0
Questions 7

After being notified of a vulnerability in the company’s online payment system, the Product Security Incident Response Team (PSIRT) was unable to recreate the vulnerability in a testing lab.

What is the response team’s next step?

Options:

A.  

Determine the Severity of the Vulnerability

B.  

Notify the Reporter That the Case Is Going to Be Closed

C.  

Determine How the Reporter Was Able to Create the Vulnerability

D.  

Identify Resources and Schedule the Fix

Discussion 0
Questions 8

Which threat modeling step identifies the assets that need to be protected?

Options:

A.  

Set the Scope

B.  

Analyze the Target

C.  

Rate Threats

D.  

Identify and Document Threats

Discussion 0
Questions 9

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?

Options:

A.  

Fuzzing

B.  

Static analysis

C.  

Dynamic analysis

D.  

Bugtraq

Discussion 0
Questions 10

Which threat modeling step collects exploitable weaknesses within the product?

Options:

A.  

Analyze the target

B.  

Rate threats

C.  

Identify and document threats

D.  

Set the scope

Discussion 0
Questions 11

Company leadership has contracted with a security firm to evaluate the vulnerability of all externally lacing enterprise applications via automated and manual system interactions. Which security testing technique is being used?

Options:

A.  

Properly-based-testing

B.  

Source-code analysis

C.  

Penetration testing

D.  

Source-code fault injection

Discussion 0
Questions 12

Which security assessment deliverable defines measures that can be periodically reported to management?

Options:

A.  

Metrics Template

B.  

SDL Project Outline

C.  

Threat Profile

D.  

Product Risk Profile

Discussion 0
Questions 13

Which step in the change management process includes modifying the source code?

Options:

A.  

Patch management

B.  

Installation management

C.  

Privacy implementation assessment

D.  

Policy compliance analysis

Discussion 0
Questions 14

Which category classifies identified threats that do not have defenses in place and expose the application to exploits?

Options:

A.  

Fully mitigated threat

B.  

Threat profile

C.  

Unmitigated threats

D.  

Partially mitigated threat

Discussion 0
Questions 15

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

Options:

A.  

Input Validation

B.  

Memory Management

C.  

Session Management

D.  

Data Protection

Discussion 0
Questions 16

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.  

Not Passed but Does Not Require Escalation

B.  

Not Passed and Requires Escalation

C.  

Passed with Exceptions

D.  

Passed

Discussion 0
Questions 17

Which privacy impact statement requirement type defines how personal information will be protected when authorized or independent external entities are involved?

Options:

A.  

Personal information retention requirements

B.  

User controls requirements

C.  

Third party requirements

D.  

Data integrity requirements

Discussion 0
Questions 18

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:

A.  

Attack models

B.  

Training

C.  

Architecture analysis

D.  

Code review

Discussion 0
Questions 19

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.  

Architecture analysis

B.  

Penetration testing

C.  

Code review

D.  

Training

Discussion 0
Questions 20

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

Options:

A.  

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.  

Enforce Strong Password Complexity Standards

C.  

Enforce Idle Time-Outs on Session IDs

D.  

Ensure All Data Is Encrypted in Transit

Discussion 0
Questions 21

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

Options:

A.  

Ensure audit trails exist for all sensitive transactions

B.  

Disable resolution of external entities in the parsing library

C.  

Enforce role-based authorization in all application layers

D.  

Ensure authentication cookies are encrypted

Discussion 0
Questions 22

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.  

Access control

B.  

System configuration

C.  

Communication security

D.  

Session management

Discussion 0
Questions 23

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

Options:

A.  

Daily Scrum

B.  

Sprint Planning

C.  

Sprint Retrospective

D.  

Sprint Review

Discussion 0
Questions 24

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

Options:

A.  

Load testing

B.  

Input validation

C.  

Intercept proxy

D.  

Reverse engineering

Discussion 0
Questions 25

Which threat modeling step assigns a score to discovered threats?

Options:

A.  

Rate Threats

B.  

Analyze the Target

C.  

Identify and Document Threats

D.  

Set the Scope

Discussion 0
Questions 26

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.  

End of Life

B.  

Design

C.  

Maintenance

D.  

Planning

Discussion 0
Questions 27

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.  

Deployment

B.  

Design

C.  

Implementation

D.  

Requirements

Discussion 0
Questions 28

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:

A.  

White box testing

B.  

Reasonableness testing

C.  

Black box testing

D.  

Dynamic testing

Discussion 0
Questions 29

Developers have finished coding, and changes have been peer-reviewed. Features have been deployed to a pre-production environment so that analysts may verify that the product is working as expected.

Which phase of the Software Development Life Cycle (SDLC) is being described?

Options:

A.  

Requirements

B.  

Design

C.  

Testing

D.  

Deployment

Discussion 0
Questions 30

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.  

Governance

B.  

Software security development life cycle (SSDL) touchpoints

C.  

Intelligence

D.  

Deployment

Discussion 0
Questions 31

Which question reflects the security change management component of the change management process?

Options:

A.  

How critical is the software to meeting the customers' mission?

B.  

What threats are possible in the environment where the software will be operating?

C.  

Which security objectives are required by the software?

D.  

How is remote administration secured?

Discussion 0
Questions 32

Which mitigation technique is used to fight against an identity spoofing threat?

Options:

A.  

Require user authorization

B.  

Filtering

C.  

Audit trails

D.  

Encryption

Discussion 0
Questions 33

A public library needs to implement security control on publicly used computers to prevent illegal downloads.

Which security control would prevent this threat?

Options:

A.  

Nonrepudiation

B.  

Authentication

C.  

Integrity

D.  

Availability

Discussion 0