Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

WGU Secure Software Design (D487, KEO1) Exam Question and Answers

WGU Secure Software Design (D487, KEO1) Exam

Last Update Nov 30, 2025
Total Questions : 118

We are offering FREE Secure-Software-Design WGU exam questions. All you do is to just go and sign up. Give your details, prepare Secure-Software-Design free exam questions and then go for complete pool of WGU Secure Software Design (D487, KEO1) Exam test questions that will help you more.

Secure-Software-Design pdf

Secure-Software-Design PDF

$36.75  $104.99
Secure-Software-Design Engine

Secure-Software-Design Testing Engine

$43.75  $124.99
Secure-Software-Design PDF + Engine

Secure-Software-Design PDF + Testing Engine

$57.75  $164.99
Questions 1

After being notified of a vulnerability in the company’s online payment system, the Product Security Incident Response Team (PSIRT) was unable to recreate the vulnerability in a testing lab.

What is the response team’s next step?

Options:

A.  

Determine the Severity of the Vulnerability

B.  

Notify the Reporter That the Case Is Going to Be Closed

C.  

Determine How the Reporter Was Able to Create the Vulnerability

D.  

Identify Resources and Schedule the Fix

Discussion 0
Questions 2

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?

Options:

A.  

Access control

B.  

System configuration

C.  

Communication security

D.  

Session management

Discussion 0
Questions 3

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.  

Maintenance

B.  

Deployment

C.  

End of life

D.  

Testing

Discussion 0
Questions 4

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.  

Not Passed but Does Not Require Escalation

B.  

Not Passed and Requires Escalation

C.  

Passed with Exceptions

D.  

Passed

Discussion 0
Questions 5

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's claims intake component. The base score of the vulnerability was 3.5 and changed to 5.9 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.  

Critical severity

B.  

High severity

C.  

Low severity

D.  

Medium severity

Discussion 0
Questions 6

Which threat modeling approach concentrates on things the organization wants to protect?

Options:

A.  

Asset-centric

B.  

Server-centric

C.  

Attacker-centric

D.  

Application-centric

Discussion 0
Questions 7

A software security team recently completed an internal assessment of the company's security assurance program. The team delivered a set of scorecards to leadership along with proposed changes designed to improve low-scoring governance, development, and deployment functions.

Which software security maturity model did the team use?

Options:

A.  

Building Security In Maturity Model (BSIMM)

B.  

Open Web Application Security Project (OWASP) Open Software Assurance Maturity Model (SAMM)

C.  

U.S. Department of Homeland Security Software Assurance Program

D.  

International Organization for Standardization ISO/IEC 27034

Discussion 0
Questions 8

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.  

Open-source licensing review report

B.  

Customer engagement framework

C.  

Remediation report

D.  

Security testing reports

Discussion 0
Questions 9

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.  

Privacy compliance report

B.  

Remediation report

C.  

Security testing reports

D.  

Security test execution report

Discussion 0
Questions 10

Which secure coding best practice says to use a single application-level authorization component that will lock down the application if it cannot access its configuration information?

Options:

A.  

Access control

B.  

Data protection

C.  

Session management

D.  

Communication security

Discussion 0
Questions 11

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.  

Medium severity

B.  

Critical severity

C.  

Low severity

D.  

High severity

Discussion 0
Questions 12

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?

Options:

A.  

Static Analysis

B.  

Fuzz Testing

C.  

Dynamic Analysis

D.  

Manual Code Review

Discussion 0
Questions 13

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.  

Property configure acceptable API requests

B.  

Enforce role-based authorization

C.  

Use API keys to enforce authorization of every request

D.  

Ensure audit logs are in place for sensitive transactions

Discussion 0
Questions 14

What are the three primary goals of the secure software development process?

Options:

A.  

Performance, reliability, and maintainability

B.  

Cost, speed to market, and profitability

C.  

Redundancy, scalability, and portability

D.  

Confidentiality, integrity, and availability

Discussion 0
Questions 15

Which software development model starts by specifying and implementing just a part of the software, which is then reviewed and identifies further requirements that are implemented by repeating the cycle?

Options:

A.  

Iterative

B.  

Implementation

C.  

Waterfall

D.  

Code and fix

Discussion 0
Questions 16

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:

A.  

Attack models

B.  

Training

C.  

Architecture analysis

D.  

Code review

Discussion 0
Questions 17

While performing functional testing of the new product from a shared machine, a QA analyst closed their browser window but did not logout of the application. A different QA analyst accessed the application an hour later and was not prompted to login. They then noticed the previous analyst was still logged into the application.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.  

Ensure no sensitive information is stored in plain text in cookies

B.  

Ensure user sessions timeout after short intervals

C.  

Ensure role-based access control is enforced for access to all resources

D.  

Ensure strong password policies are enforced

Discussion 0
Questions 18

What is one of the tour core values of the agile manifesto?

Options:

A.  

Communication between team members

B.  

Individuals and interactions over processes and tools

C.  

Business people and developers must work together daily throughout the project.

D.  

Teams should have a dedicated and open workspace.

Discussion 0
Questions 19

Which security assessment deliverable identities possible security vulnerabilities in the product?

Options:

A.  

SDL project outline

B.  

Metrics template

C.  

Threat profile

D.  

List of third-party software

Discussion 0
Questions 20

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.  

Architecture analysis

B.  

Penetration testing

C.  

Code review

D.  

Training

Discussion 0
Questions 21

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.  

Deployment

B.  

Design

C.  

Implementation

D.  

Requirements

Discussion 0
Questions 22

The software security team prepared a report of necessary coding and architecture changes identified during the security assessment.

Which design and development deliverable did the team prepare?

Options:

A.  

Updated threat modeling artifacts

B.  

Security test plans

C.  

Privacy implementation assessment results

D.  

Design security review

Discussion 0
Questions 23

Automated security testing was performed by attempting to log in to the new product with a known username using a collection of passwords. Access was granted after a few hundred attempts.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.  

Ensure passwords are encrypted when stored in persistent data stores

B.  

Ensure authentication controls are resistant to brute force attacks

C.  

Ensure strong password policies are enforced

D.  

Ensure credentials and authentication tokens are encrypted during transit

Discussion 0
Questions 24

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

Options:

A.  

Input Validation

B.  

Memory Management

C.  

Session Management

D.  

Data Protection

Discussion 0
Questions 25

Which secure coding best practice ensures sensitive information is not disclosed in any responses to users, authorized or unauthorized?

Options:

A.  

Input validation

B.  

System configuration

C.  

Authentication and password management

D.  

Error handling and logging

Discussion 0
Questions 26

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.  

Output Encoding

B.  

Input Validation

C.  

Access Control

D.  

Session Management

Discussion 0
Questions 27

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:

A.  

Inputs enforce type, format, length, and range checks.

B.  

All administrative activities are logged and audited.

C.  

Sensitive information is not logged.

D.  

All exceptions are handled in a structured way.

Discussion 0
Questions 28

Which category classifies identified threats that have some defenses in place and expose the application to limited exploits?

Options:

A.  

Fully Mitigated Threat

B.  

Unmitigated Threats

C.  

Threat Profile

D.  

Partially Mitigated Threat

Discussion 0
Questions 29

Which secure software design principle assumes attackers have the source code and specifications of the product?

Options:

A.  

Open Design

B.  

Psychological Acceptability

C.  

Total Mediation

D.  

Separation of Privileges

Discussion 0
Questions 30

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.  

Least Privilege

B.  

Total Mediation

C.  

Separation of Privileges

D.  

Psychological Acceptability

Discussion 0
Questions 31

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

Options:

A.  

Define technical scope

B.  

Attack modeling

C.  

Define objectives

D.  

Application decomposition

Discussion 0
Questions 32

The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.

Which security testing technique is being used?

Options:

A.  

Automated vulnerability scanning

B.  

Penetration testing

C.  

Properly-based testing

D.  

Source-code analysis

Discussion 0
Questions 33

Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?

Options:

A.  

Privacy

B.  

Principle of Least Privilege

C.  

Elevation of Privilege

D.  

Confidentiality

Discussion 0
Questions 34

During penetration testing, an analyst was able to create hundreds of user accounts by executing a script that sent individual requests to the registration endpoint.

How should the organization remediate this vulnerability?

Options:

A.  

Use a Tool Like CAPTCHA to Prevent Batched Registrations and Bots

B.  

Enforce Strong Password Complexity Standards

C.  

Enforce Idle Time-Outs on Session IDs

D.  

Ensure All Data Is Encrypted in Transit

Discussion 0
Questions 35

Which mitigation technique is used to fight against an identity spoofing threat?

Options:

A.  

Require user authorization

B.  

Filtering

C.  

Audit trails

D.  

Encryption

Discussion 0