Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

D487 Secure Software Design – Complete Study Guide & Practice Questions

Note
-
Vendu
-
Pages
32
Grade
A+
Publié le
22-01-2026
Écrit en
2025/2026

Prepare effectively for WGU D487 Secure Software Design with this comprehensive study guide. Covers core concepts including secure coding practices, threat modeling, vulnerability assessment, software lifecycle security, and risk mitigation strategies. Includes practice questions with detailed explanations to reinforce understanding, support exam preparation, and build confidence for assessments. Designed for WGU students seeking structured review and mastery of secure software design principles.

Montrer plus Lire moins
Établissement
Secure Software Design
Cours
Secure Software Design

Aperçu du contenu

2026- D487 Secure Software Design Questions and
D487
Answers.pdf
Secure
D487 Secure
Software
Software
Design Design
Questions
Questions
and Answers
and Answers.pdfExam Questions and Answers Grade A




D487: Secure Software Design
Questions and Answers


What are the two common best principles of software applications in the development process? Choose
2 answers.

Quality code

Secure code

Information security

Integrity

Availability

Quality code

Secure code



"Quality code" is correct. Quality code is efficient code that is easy to maintain and reusable.

"Secure code" is correct. Secure code authorizes and authenticates every user transaction, logs the
transaction, and denies all unauthorized requisitions.




What ensures that the user has the appropriate role and privilege to view data?

Authentication

Multi-factor authentication

Encryption

Information security

Authorization

Authorization



Authorization ensures a user's information and credentials are approved by the system.




D487 Secure Software Design Questions and Answers
D487 Secure
D487Software
Secure Software
Design Questions
Design Questions
and Answers.pdf
and Answers.pdfExam Questions and Answers Grade A

,2026- D487 Secure Software Design Questions and
D487
Answers.pdf
Secure
D487 Secure
Software
Software
Design Design
Questions
Questions
and Answers
and Answers.pdfExam Questions and Answers Grade A




Which security goal is defined by "guarding against improper information modification or destruction
and ensuring information non-repudiation and authenticity"?

Integrity

Quality

Availability

Reliability

Integrity



The data must remain unchanged by unauthorized users and remain reliable from the data entry point
to the database and back.




Which phase in an SDLC helps to define the problem and scope of any existing systems and determine
the objectives of new systems?

Requirements

Design

Planning

Testing

Planning



The planning stage sets the project schedule and looks at the big picture.




What happens during a dynamic code review?

Programmers monitor system memory, functional behavior, response times, and overall performance.

Customers perform tests to check software meets requirements.

An analysis of computer programs without executing them is performed.

Input fields are supplied with unexpected input and tested.




D487 Secure Software Design Questions and Answers
D487 Secure
D487Software
Secure Software
Design Questions
Design Questions
and Answers.pdf
and Answers.pdfExam Questions and Answers Grade A

,2026- D487 Secure Software Design Questions and
D487
Answers.pdf
Secure
D487 Secure
Software
Software
Design Design
Questions
Questions
and Answers
and Answers.pdfExam Questions and Answers Grade A




Programmers monitor system memory, functional behavior, response times, and overall performance.




How should you store your application user credentials in your application database?

Use application logic to encrypt credentials

Store credentials as clear text

Store credentials using Base 64 encoded

Store credentials using salted hashes

Store credentials using salted hashes



Hashing is a one-way process that converts a password to ciphertext using hash algorithms. Password
salting adds random characters before or after a password prior to hashing to obfuscate the actual
password.




Which software methodology resembles an assembly-line approach?

V-model

Agile model

Iterative model

Waterfall model

Waterfall model



Waterfall model is a continuous software development model in which the development steps flow
steadily downwards.




Which software methodology approach provides faster time to market and higher business value?

Iterative model

Waterfall model

V-model




D487 Secure Software Design Questions and Answers
D487 Secure
D487Software
Secure Software
Design Questions
Design Questions
and Answers.pdf
and Answers.pdfExam Questions and Answers Grade A

, 2026- D487 Secure Software Design Questions and
D487
Answers.pdf
Secure
D487 Secure
Software
Software
Design Design
Questions
Questions
and Answers
and Answers.pdfExam Questions and Answers Grade A




Agile model

Agile model



In the agile model, projects are divided into small incremental builds that provide working software at
the end of each iteration and adds value to business.




In Scrum methodology, who is responsible for making decisions on the requirements?

Scrum Team

Product Owner

ScrumMaster

Technical Lead

Product Owner



The Product Owner is responsible for requirements/backlog items and prioritizing them.




What is the reason software security teams host discovery meetings with stakeholders early in the
development life cycle?

To determine how much budget is available for new security tools

To meet the development team

To refactor functional requirements to ensure security is included

To ensure that security is built into the product from the start

To ensure that security is built into the product from the start



To correctly and cost-effectively introduce security into the software development life cycle, it needs to
be done early.




D487 Secure Software Design Questions and Answers
D487 Secure
D487Software
Secure Software
Design Questions
Design Questions
and Answers.pdf
and Answers.pdfExam Questions and Answers Grade A

École, étude et sujet

Établissement
Secure Software Design
Cours
Secure Software Design

Infos sur le Document

Publié le
22 janvier 2026
Nombre de pages
32
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses
$21.99
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
ScholarsEdge University of the Witwatersrand
Voir profil
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
5229
Membre depuis
1 année
Nombre de followers
1
Documents
1064
Dernière vente
1 jours de cela

4.5

140 revues

5
110
4
10
3
8
2
4
1
8

Documents populaires

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions