WGU D487: Secure Software Design Practice
__., __., __., __., __., __.,
Questions with Approved Answers | Latest __., __., __., __., __., __.,
2024/2025
The software security team is currently working to identify approaches for
__., __., __., __., __., __., __., __., __., __., __
input validation, authentication, authorization, and configuration
., __., __., __., __., __., __.,
management of a new software product so they can deliver a security
__., __., __., __., __., __., __., __., __., __., __., __.,
profile. Which threat modeling step is being described?
__., __., __., __., __., __., __.,
-Rating threats __.,
-Identifying and documenting threats __., __., __.,
-analyzing the target __., __.,
-drawing data flow diagram __., __., __., __.,__., __., -analyzing the target __., __.,
The organization's testing team has created a catalog of test cases using
__., __., __., __., __., __., __., __., __., __., __., __.
the source code and design documentation of the new product. Each test
, __., __., __., __., __., __., __., __., __., __., __., _
case will be executed for each user role in the new product. Which type
_., __., __., __., __., __., __., __., __., __., __., __., __., __.,
of security testing technique is being performed?
__., __., __., __., __., __., __.,
-gray-box
-black-box
-white-box
-red-box __.,__., -white-box
__.,
What is the study of real-
__., __., __., __., __.,
world software security initiatives organized so companies can measure
__., __., __., __., __., __., __., __., __.,
their initiatives and understand how to evolve them over time?
__., __., __., __., __., __., __., __., __.,
-Building Security in Maturity Model (BSIMM)
__., __., __., __., __.,
-Security features and design __., __., __.,
,-OWASP Software Assurance Maturity Model (SAMM)
__., __., __., __., __.,
-ISO 27001
__., __.,__., __.,-Building Security in Maturity Model (BSIMM)
__., __., __., __., __.,
What is the analysis of computer software that is performed without
__., __., __., __., __., __., __., __., __., __., __.,
executing programs? __.,
-static analysis
__.,
-fuzzing
-dynamic analysis __.,
-owasp zap __., __.,__., __., -static analysis __.,
what iso standard is the benchmark for information security today?
__., __., __., __., __., __., __., __., __.,
-iso 27001
__.,
-iso 7799
__.,
-iso 27034
__.,
-iso 8601
__., __.,__., -iso 27001
__., __.,
what is the analysis of computer software that is performed by executing
__., __., __., __., __., __., __., __., __., __., __., __.
programs on a real or virtual processor in real time?
, __., __., __., __., __., __., __., __., __.,
-dynamic analysis __.,
-static analysis
__.,
-fuzzing
-security testing __., __.,__., -dynamic analysis
__., __.,
which person is responsible for designing, planning, and implementing
__., __., __., __., __., __., __., __., __.,
secure coding practices and security testing methodologies?
__., __., __., __., __., __.,
, -software security architect __., __.,
-product security developer __., __.,
-software security champion __., __.,
-software tester __., __.,__., __.,-software security architect __., __.,
what is a list of information security vulnerabilities that aims to provide
__., __., __., __., __., __., __., __., __., __., __., __
names for publicly known problems?
., __., __., __., __.,
-common computer vulnerabilities and exposures (CVE)
__., __., __., __., __.,
- SANS institute top cyber security risks
__., __., __., __., __., __.,
-bugtraq
- Carnegie melon computer emergency readiness team (CERT)
__., __., __., __., __., __., __., __.,__., -
__.,
common computer vulnerabilities and exposures (CVE)
__., __., __., __., __.,
which secure coding best practice uses well-
__., __., __., __., __., __.,
tested, publicly available algorithms to hide product data from unauthorize
__., __., __., __., __., __., __., __., __.,
d access?
__.,
-access control __.,
-authentication and password management __., __., __.,
-cryptographic practices __.,
-data protection __., __.,__., __., -cryptographic practices __.,
which secure coding best practice ensures servers, frameworks, and system
__., __., __., __., __., __., __., __., __.,
components are all running the latest approved versions?
__., __., __., __., __., __., __., __.,
-file management
__.,
-input validation __.,
-database security __.,