100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Secure Software Design Exam 2025 | WGU D487 Secure Software Design Actual Exam 2025 Questions and Correct Answers Rated A+

Rating
-
Sold
2
Pages
34
Grade
A+
Uploaded on
23-01-2025
Written in
2024/2025

WGU D487 Secure Software Design Exam 2025 | WGU D487 Secure Software Design Actual Exam 2025 Questions and Correct Answers Rated A+

Institution
WGU D487 Secure Software Design
Course
WGU D487 Secure Software Design











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 Secure Software Design
Course
WGU D487 Secure Software Design

Document information

Uploaded on
January 23, 2025
Number of pages
34
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D487 Secure Software Design Exam
2025 | WGU D487 Secure Software Design
Actual Exam 2025 Questions and Correct
Answers Rated A+

Which practice in the Ship (A5) phase of the security development
cycle verifies whether the product meets security mandates? -
ANSWER-A5 policy compliance analysis

Which post-release support activity defines the process to
communicate, identify, and alleviate security threats? -ANSWER-
PRSA1: External vulnerability disclosure response

What are two core practice areas of the OWASP Security Assurance
Maturity Model (OpenSAMM)? -ANSWER-Governance, Construction

Which practice in the Ship (A5) phase of the security development
cycle uses tools to identify weaknesses in the product? -ANSWER-
Vulnerability scan

Which post-release support activity should be completed when
companies are joining together? -ANSWER-Security architectural
reviews

Which of the Ship (A5) deliverables of the security development cycle
are performed during the A5 policy compliance analysis? -ANSWER-
Analyze activities and standards

,Which of the Ship (A5) deliverables of the security development cycle
are performed during the code-assisted penetration testing? -
ANSWER-white-box security test

Which of the Ship (A5) deliverables of the security development cycle
are performed during the open-source licensing review? -ANSWER-
license compliance

Which of the Ship (A5) deliverables of the security development cycle
are performed during the final security review? -ANSWER-Release
and ship

How can you establish your own SDL to build security into a process
appropriate for your organization's needs based on agile? -ANSWER-
iterative development

How can you establish your own SDL to build security into a process
appropriate for your organization's needs based on devops? -
ANSWER-continuous integration and continuous deployments

How can you establish your own SDL to build security into a process
appropriate for your organization's needs based on cloud? -ANSWER-
API invocation processes

How can you establish your own SDL to build security into a process
appropriate for your organization's needs based on digital enterprise?
-ANSWER-enables and improves business activities

Which phase of penetration testing allows for remediation to be
performed? -ANSWER-Deploy

,Which key deliverable occurs during post-release support? -
ANSWER-third-party reviews

Which business function of OpenSAMM is associated with
governance? -ANSWER-Policy and compliance

Which business function of OpenSAMM is associated with
construction? -ANSWER-Threat assessment

Which business function of OpenSAMM is associated with
verification? -ANSWER-Code review

Which business function of OpenSAMM is associated with
deployment? -ANSWER-Vulnerability management

What is the product risk profile? -ANSWER-A security assessment
deliverable that estimates the actual cost of the product.

A software security team member has been tasked with creating a
deliverable that provides details on where and to what degree
sensitive customer information is collected, stored, or created within a
new product offering. What does the team member need to deliver in
order to meet the objective? -ANSWER-Privacy impact assessment

What is the first phase in the security development life cycle? -
ANSWER-A1 Security Assessment

What are the three areas of compliance requirements? -ANSWER-
Legal, financial, and industry standards

, What term refers to how the system should function based on the
environment in which the system will operate? -ANSWER-operational
requirements

During what phase of SDL do all key stakeholders discuss, identify,
and have common understandings of the security and privacy
implications, considerations, and requirements? -ANSWER-A1
Security Assessment

What are the three areas of focus in secure software requirements? -
ANSWER-Gathering the software requirements, data classification,
and managing data protection requirements

During what phase of SDL is an initial project outline for security
milestones developed and integrated into the development project
schedule? -ANSWER-A1 Security Assessment

What term means requirements that describe what the system will do
and its core purpose? -ANSWER-functional requirements

What term means requirements that describe any constraints or
restrictions on a design but do not impact the core purpose of the
system -ANSWER-non-functional requirements

What term is a process that evaluates issues and privacy impact
rating in relation to the privacy of personally identifiable information in
the software? -ANSWER-privacy impact assessment

What term helps to determine the actual cost of the product from
different perspectives? -ANSWER-product risk profile

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nurselyn Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
44
Member since
1 year
Number of followers
5
Documents
1361
Last sold
1 day ago

3.8

5 reviews

5
3
4
0
3
0
2
2
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions