Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Secure-Software-Design WGU Secure Software Design (D487, KEO1) Exam Exam Practice Test

WGU Secure Software Design (D487, KEO1) Exam Questions and Answers

Question 1

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

Options:

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Question 2

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis

B.

Penetration testing

C.

Code review

D.

Training

Question 3

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

Options:

A.

Medium severity

B.

Critical severity

C.

Low severity

D.

High severity

Question 4

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Penetration testing

B.

Policy compliance analysis

C.

Open-source licensing review

D.

Final security review

Question 5

Due to positive publicity from the release of the new software product, leadership has decided that it is in the best interests of the company to become ISO 27001 compliant. ISO 27001 is the leading international standard focused on information security.

Which security development life cycle deliverable is being described?

Options:

A.

External vulnerability disclosure response process

B.

Third-party security review

C.

Security strategy for M&A products

D.

Post-release certifications

Question 6

Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?

Options:

A.

Access Control

B.

Data Protection

C.

Input Validation

D.

Authentication

Question 7

The software security team is performing security testing on a new software product using a testing tool that scans the running application for known exploit signatures.

Which security testing technique is being used?

Options:

A.

Automated vulnerability scanning

B.

Penetration testing

C.

Properly-based testing

D.

Source-code analysis

Question 8

A potential threat was discovered during automated system testing when a PATCH request sent to the API caused an unhandled server exception. The API only supports GET. POST. PUT, and DELETE requests.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Property configure acceptable API requests

B.

Enforce role-based authorization

C.

Use API keys to enforce authorization of every request

D.

Ensure audit logs are in place for sensitive transactions

Question 9

What is a countermeasure to the web application security frame (ASF) authentication threat category?

Options:

A.

Role-based access controls restrict access

B.

Credentials and tokens are encrypted.

C.

Cookies have expiration timestamps.

D.

Sensitive information is scrubbed from error messages

Question 10

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Implementation

B.

Design

C.

Planning

D.

Requirements

Question 11

Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.

Which deliverable is being prepared?

Options:

A.

Open-source licensing review report

B.

Customer engagement framework

C.

Remediation report

D.

Security testing reports

Question 12

A product team, consisting of a Scrum Master, a Business Analyst, two Developers, and a Quality Assurance Tester, are on a video call with the Product Owner. The team is reviewing a list of work items to determine how many they feel can be added to their backlog and completed within the next two-week iteration.

Which Scrum ceremony is the team participating in?

Options:

A.

Daily Scrum

B.

Sprint Planning

C.

Sprint Retrospective

D.

Sprint Review

Question 13

Which mitigation technique can be used to light against a threat where a user may gain access to administrator level functionality?

Options:

A.

Encryption

B.

Quality of service

C.

Hashes

D.

Run with least privilege

Question 14

What is an advantage of using the Agile development methodology?

Options:

A.

Customer satisfaction is improved through rapid and continuous delivery of useful software.

B.

Each stage is clearly defined, making it easier to assign clear roles to teams and departments who feed into the project.

C.

The overall plan fits very neatly into a Gantt chart so a project manager can easily view the project timeline.

D.

There is much less predictability throughout the project regarding deliverables.

Question 15

A recent vulnerability scan uncovered an XML external entity (XXE) Haw that could allow attackers to return the contents of a system file by including a specific payload in an XML request.

How should the organization remediate this vulnerability?

Options:

A.

Ensure audit trails exist for all sensitive transactions

B.

Disable resolution of external entities in the parsing library

C.

Enforce role-based authorization in all application layers

D.

Ensure authentication cookies are encrypted

Question 16

Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?

Options:

A.

Privacy

B.

Principle of Least Privilege

C.

Elevation of Privilege

D.

Confidentiality

Question 17

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

Options:

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Question 18

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

Options:

A.

Load testing

B.

Input validation

C.

Intercept proxy

D.

Reverse engineering

Question 19

Which question reflects the security change management component of the change management process?

Options:

A.

How critical is the software to meeting the customers' mission?

B.

What threats are possible in the environment where the software will be operating?

C.

Which security objectives are required by the software?

D.

How is remote administration secured?

Question 20

Which DKEAD category has a risk rating based on the threat exploit's potential level of harm?

Options:

A.

Damage potential

B.

Reproducibility

C.

Affected users

D.

Exploitability

Question 21

During fuzz testing of the new product, an exception was thrown on the order entry view, which caused a full stack dump to be displayed in the browser window that included function names from the source code.

How should existing security controls be adjusted to prevent this in the future?

Options:

A.

Ensure privileges are restored after application exceptions

B.

Ensure all exceptions are handled in a standardized way

C.

Ensure private information is not logged

D.

Ensure sensitive information is scrubbed from all error messages

Question 22

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

Options:

A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Question 23

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

Options:

A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Question 24

The product security incident response team (PSIRT) has decided to make a formal public disclosure, including base and temporal common vulnerability scoring system (CVSS) scores and a common vulnerabilities and exposures (CVE) ID report, of an externally discovered vulnerability.

What is the most likely reason for making a public disclosure?

Options:

A.

The potential for increased public awareness of a vulnerability is probable, which could lead to higher risk for customers.

B.

The vulnerability reporter has threatened to make the finding public after being notified that their case was not credible.

C.

The response team has determined that the vulnerability is credible.

D.

Notification of a vulnerability from an external party has occurred.

Question 25

Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.

How should the organization remediate this vulnerability?

Options:

A.

Ensure servers are configured to return as little information as possible to network requests

B.

Ensure servers are regularly updated with the latest security patches

C.

Always uninstall or disable features that are not required

D.

Access to configuration files is limited to administrators

Question 26

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

Options:

A.

Privacy compliance report

B.

Remediation report

C.

Security testing reports

D.

Security test execution report

Question 27

Which security assessment deliverable identities possible security vulnerabilities in the product?

Options:

A.

SDL project outline

B.

Metrics template

C.

Threat profile

D.

List of third-party software

Question 28

The software security team is performing security testing for a new software product that is close to production release. They are concentrating on integrations between the new product and database servers, web servers, and web services.

Which security testing technique is being used?

Options:

A.

Fuzz testing

B.

Dynamic code analysis

C.

Binary fault injection

D.

Binary code analysis

Question 29

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

Options:

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Question 30

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Question 31

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

Options:

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

Question 32

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

Options:

A.

Dynamic analysis

B.

Fuzzing

C.

Threat model

D.

Static analysis

Question 33

What is the privacy impact rating of an application that stores personally identifiable information, monitors users with ongoing transfers of anonymous data, and changes settings without notifying the user?

Options:

A.

P1 high privacy risk

B.

P2 moderate privacy risk

C.

P3 low privacy risk

D.

P4 no privacy risk

Question 34

The organization is moving from a waterfall to an agile software development methodology, so the software security group must adapt the security development life cycle as well. They have decided to break out security requirements and deliverables to fit better in the iterative life cycle by defining every-sprint requirements, one-time requirements, bucket requirements, and final security review requirements.

Which type of requirement slates that the team must identify primary security and privacy contacts?

Options:

A.

Final security review requirement

B.

Bucket requirement

C.

Every-sprint requirement

D.

One-time requirement

Question 35

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers are actively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle (SDLC) is being described?

Options:

A.

Deployment

B.

Design

C.

Implementation

D.

Requirements