WGU C706 Secure Software Design Exam / WGU Master's Course C706 - Secure Software Design New 2023 / 2025 Update Questions and Verified Answers 100% Correct Graded A
WGU C706 Secure Software Design Exam / WGU Master's Course C706 - Secure Software Design New 2023 / 2025 Update Questions and Verified Answers 100% Correct Graded A Which due diligence activity for supply chain security should occur in the initiation phase of the software acquisition life cycle? A Developing a request for proposal (RFP) that includes supply chain security risk management B Lessening the risk of disseminating information during disposal C Facilitating knowledge transfer between suppliers D Mitigating supply chain security risk by providing user guidance - ANSWER-A Which due diligence activity for supply chain security investigates the means by which data sets are shared and assessed? A on-site assessment B process policy review C third-party assessment D document exchange and review - ANSWER-D Consider these characteristics: -Identification of the entity making the access request -Verification that the request has not changed since its initiation -Application of the appropriate authorization procedures -Reexamination of previously authorized requests by the same entity Which security design analysis is being described? A Open design B Complete mediation C Economy of mechanism D Least common mechanism - ANSWER-B Which software security principle guards against the improper modification or destruction of information and ensures the nonrepudiation and authenticity of information? A Quality B Integrity C Availability D Confidentiality - ANSWER-B What type of functional security requirement involves receiving, processing, storing, transmitting, and delivering in report form? A Logging B Error handling C Primary dataflow D Access control flow - ANSWER-C Which nonfunctional security requirement provides a way to capture information correctly and a way to store that information to help support later audits? A Logging B Error handling C Primary dataflow D Access control flow - ANSWER-A Which security concept refers to the quality of information that could cause harm or damage if disclosed? A Isolation B Discretion C Seclusion D Sensitivity - ANSWER-D Which technology would be an example of an injection flaw, according to the OWASP Top 10? A SQL B API C XML D XSS - ANSWER-A
Geschreven voor
- Instelling
- WGU C706 Secure Software Design / WGU Master\'
- Vak
- WGU C706 Secure Software Design / WGU Master\'
Documentinformatie
- Geüpload op
- 10 juni 2024
- Aantal pagina's
- 95
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
wgu c706 secure software design exam wgu
-
wgu c706 secure software design exam wgu master
-
wgu c706 secure software design exam wgu master