Leads4pass > WGU > Courses and Certificates > SECURE-SOFTWARE-DESIGN > SECURE-SOFTWARE-DESIGN Online Practice Questions and Answers

SECURE-SOFTWARE-DESIGN Online Practice Questions and Answers

Questions 4

What is one of the four core values of the agile manifesto?

A. Communication between team members.

B. Individuals and interactions over processes and tools.

C. Business people and developers must work together daily throughout the project.

D. Teams should have a dedicated and open workspace.

Buy Now
Questions 5

Which design and development deliverable contains the types of evaluations that were performed, how many times they were performed, and how many times they were re-evaluated?

A. Privacy compliance report

B. Remediation report

C. Security testing reports

D. Security test execution report

Buy Now
Questions 6

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

A. General coding practices

B. Input validation

C. Session management

D. System configuration

Buy Now
Questions 7

What sits between a browser and an internet connection and alters requests and responses in a way the developer did not intend?

A. Load testing

B. Input validation

C. Intercept proxy

D. Reverse engineering

Buy Now
Questions 8

Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward. Which phase of the software development lifecycle (SDLC) is being described?

A. Implementation

B. Design

C. Planning

D. Requirements

Buy Now
Questions 9

Which SDL security goal is defined as ensuring timely and reliable access to and use of information?

A. Information security

B. Confidentiality

C. Availability

D. Integrity

Buy Now
Questions 10

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

A. Define technical scope

B. Attack modeling

C. Define objectives

D. Application decomposition

Buy Now
Questions 11

A public library needs to implement security control on publicly used computers to prevent illegal downloads. Which security control would prevent this threat?

A. Nonrepudiation

B. Authentication

C. Integrity

D. Availability

Buy Now
Questions 12

Which threat modeling approach concentrates on things the organization wants to protect?

A. Asset-centric

B. Server-centric

C. Attacker-centric

D. Application-centric

Buy Now
Questions 13

What is the last step of the SDLC/SDL code review process?

A. Review for security issues unique to the architecture

B. Identify security code review objectives

C. Perform preliminary scan

D. Review code for security issues

Buy Now
Exam Name: WGUSecure Software Design (KEO1) Exam
Last Update: Nov 15, 2024
Questions: 66
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99