WGU D487 Secure SW Design OA Exam
Questions with Correct Answers 2025
WhichHpracticeHinHtheHShipH(A5)HphaseHofHtheHsecurityHdevelopmentHcycleHverifiesHwhetherHtheHp
roductHmeetsHsecurityHmandates?H-HCORRECTHANSWERH-A5HpolicyHcomplianceHanalysis
WhichHpost-
releaseHsupportHactivityHdefinesHtheHprocessHtoHcommunicate,Hidentify,HandHalleviateHsecurityHthr
eats?H-HCORRECTHANSWERH-PRSA1:HExternalHvulnerabilityHdisclosureHresponse
WhatHareHtwoHcoreHpracticeHareasHofHtheHOWASPHSecurityHAssuranceHMaturityHModelH(OpenSAM
M)?H-HCORRECTHANSWERH-Governance,HConstruction
WhichHpracticeHinHtheHShipH(A5)HphaseHofHtheHsecurityHdevelopmentHcycleHusesHtoolsHtoHidentifyH
weaknessesHinHtheHproduct?H-HCORRECTHANSWERH-VulnerabilityHscan
WhichHpost-
releaseHsupportHactivityHshouldHbeHcompletedHwhenHcompaniesHareHjoiningHtogether?H-
HCORRECTHANSWERH-SecurityHarchitecturalHreviews
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHA5HpolicyHcomplianceHanalysis?H-HCORRECTHANSWERH-AnalyzeHactivitiesHandHstandards
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHcode-assistedHpenetrationHtesting?H-HCORRECTHANSWERH-white-boxHsecurityHtest
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHopen-sourceHlicensingHreview?H-HCORRECTHANSWERH-licenseHcompliance
,WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHfinalHsecurityHreview?H-HCORRECTHANSWERH-ReleaseHandHship
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHagile?H-HCORRECTHANSWERH-iterativeHdevelopment
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHdevops?H-HCORRECTHANSWERH-
continuousHintegrationHandHcontinuousHdeployments
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHcloud?H-HCORRECTHANSWERH-APIHinvocationHprocesses
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHdigitalHenterprise?H-HCORRECTHANSWERH-
enablesHandHimprovesHbusinessHactivities
WhichHphaseHofHpenetrationHtestingHallowsHforHremediationHtoHbeHperformed?H-
HCORRECTHANSWERH-Deploy
WhichHkeyHdeliverableHoccursHduringHpost-releaseHsupport?H-HCORRECTHANSWERH-third-
partyHreviews
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHgovernance?H-HCORRECTHANSWERH-
PolicyHandHcompliance
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHconstruction?H-HCORRECTHANSWERH-
ThreatHassessment
, WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHverification?H-HCORRECTHANSWERH-
CodeHreview
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHdeployment?H-HCORRECTHANSWERH-
VulnerabilityHmanagement
WhatHisHtheHproductHriskHprofile?H-HCORRECTHANSWERH-
AHsecurityHassessmentHdeliverableHthatHestimatesHtheHactualHcostHofHtheHproduct.
AHsoftwareHsecurityHteamHmemberHhasHbeenHtaskedHwithHcreatingHaHdeliverableHthatHprovidesHde
tailsHonHwhereHandHtoHwhatHdegreeHsensitiveHcustomerHinformationHisHcollected,Hstored,HorHcreat
edHwithinHaHnewHproductHoffering.HWhatHdoesHtheHteamHmemberHneedHtoHdeliverHinHorderHtoHme
etHtheHobjective?H-HCORRECTHANSWERH-PrivacyHimpactHassessment
WhatHisHtheHfirstHphaseHinHtheHsecurityHdevelopmentHlifeHcycle?H-HCORRECTHANSWERH-
A1HSecurityHAssessment
WhatHareHtheHthreeHareasHofHcomplianceHrequirements?H-HCORRECTHANSWERH-
Legal,Hfinancial,HandHindustryHstandards
WhatHtermHrefersHtoHhowHtheHsystemHshouldHfunctionHbasedHonHtheHenvironmentHinHwhichHtheHsy
stemHwillHoperate?H-HCORRECTHANSWERH-operationalHrequirements
DuringHwhatHphaseHofHSDLHdoHallHkeyHstakeholdersHdiscuss,Hidentify,HandHhaveHcommonHundersta
ndingsHofHtheHsecurityHandHprivacyHimplications,Hconsiderations,HandHrequirements?H-
HCORRECTHANSWERH-A1HSecurityHAssessment
WhatHareHtheHthreeHareasHofHfocusHinHsecureHsoftwareHrequirements?H-HCORRECTHANSWERH-
GatheringHtheHsoftwareHrequirements,HdataHclassification,HandHmanagingHdataHprotectionHrequire
ments
Questions with Correct Answers 2025
WhichHpracticeHinHtheHShipH(A5)HphaseHofHtheHsecurityHdevelopmentHcycleHverifiesHwhetherHtheHp
roductHmeetsHsecurityHmandates?H-HCORRECTHANSWERH-A5HpolicyHcomplianceHanalysis
WhichHpost-
releaseHsupportHactivityHdefinesHtheHprocessHtoHcommunicate,Hidentify,HandHalleviateHsecurityHthr
eats?H-HCORRECTHANSWERH-PRSA1:HExternalHvulnerabilityHdisclosureHresponse
WhatHareHtwoHcoreHpracticeHareasHofHtheHOWASPHSecurityHAssuranceHMaturityHModelH(OpenSAM
M)?H-HCORRECTHANSWERH-Governance,HConstruction
WhichHpracticeHinHtheHShipH(A5)HphaseHofHtheHsecurityHdevelopmentHcycleHusesHtoolsHtoHidentifyH
weaknessesHinHtheHproduct?H-HCORRECTHANSWERH-VulnerabilityHscan
WhichHpost-
releaseHsupportHactivityHshouldHbeHcompletedHwhenHcompaniesHareHjoiningHtogether?H-
HCORRECTHANSWERH-SecurityHarchitecturalHreviews
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHA5HpolicyHcomplianceHanalysis?H-HCORRECTHANSWERH-AnalyzeHactivitiesHandHstandards
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHcode-assistedHpenetrationHtesting?H-HCORRECTHANSWERH-white-boxHsecurityHtest
WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHopen-sourceHlicensingHreview?H-HCORRECTHANSWERH-licenseHcompliance
,WhichHofHtheHShipH(A5)HdeliverablesHofHtheHsecurityHdevelopmentHcycleHareHperformedHduringHth
eHfinalHsecurityHreview?H-HCORRECTHANSWERH-ReleaseHandHship
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHagile?H-HCORRECTHANSWERH-iterativeHdevelopment
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHdevops?H-HCORRECTHANSWERH-
continuousHintegrationHandHcontinuousHdeployments
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHcloud?H-HCORRECTHANSWERH-APIHinvocationHprocesses
HowHcanHyouHestablishHyourHownHSDLHtoHbuildHsecurityHintoHaHprocessHappropriateHforHyourHorgan
ization'sHneedsHbasedHonHdigitalHenterprise?H-HCORRECTHANSWERH-
enablesHandHimprovesHbusinessHactivities
WhichHphaseHofHpenetrationHtestingHallowsHforHremediationHtoHbeHperformed?H-
HCORRECTHANSWERH-Deploy
WhichHkeyHdeliverableHoccursHduringHpost-releaseHsupport?H-HCORRECTHANSWERH-third-
partyHreviews
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHgovernance?H-HCORRECTHANSWERH-
PolicyHandHcompliance
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHconstruction?H-HCORRECTHANSWERH-
ThreatHassessment
, WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHverification?H-HCORRECTHANSWERH-
CodeHreview
WhichHbusinessHfunctionHofHOpenSAMMHisHassociatedHwithHdeployment?H-HCORRECTHANSWERH-
VulnerabilityHmanagement
WhatHisHtheHproductHriskHprofile?H-HCORRECTHANSWERH-
AHsecurityHassessmentHdeliverableHthatHestimatesHtheHactualHcostHofHtheHproduct.
AHsoftwareHsecurityHteamHmemberHhasHbeenHtaskedHwithHcreatingHaHdeliverableHthatHprovidesHde
tailsHonHwhereHandHtoHwhatHdegreeHsensitiveHcustomerHinformationHisHcollected,Hstored,HorHcreat
edHwithinHaHnewHproductHoffering.HWhatHdoesHtheHteamHmemberHneedHtoHdeliverHinHorderHtoHme
etHtheHobjective?H-HCORRECTHANSWERH-PrivacyHimpactHassessment
WhatHisHtheHfirstHphaseHinHtheHsecurityHdevelopmentHlifeHcycle?H-HCORRECTHANSWERH-
A1HSecurityHAssessment
WhatHareHtheHthreeHareasHofHcomplianceHrequirements?H-HCORRECTHANSWERH-
Legal,Hfinancial,HandHindustryHstandards
WhatHtermHrefersHtoHhowHtheHsystemHshouldHfunctionHbasedHonHtheHenvironmentHinHwhichHtheHsy
stemHwillHoperate?H-HCORRECTHANSWERH-operationalHrequirements
DuringHwhatHphaseHofHSDLHdoHallHkeyHstakeholdersHdiscuss,Hidentify,HandHhaveHcommonHundersta
ndingsHofHtheHsecurityHandHprivacyHimplications,Hconsiderations,HandHrequirements?H-
HCORRECTHANSWERH-A1HSecurityHAssessment
WhatHareHtheHthreeHareasHofHfocusHinHsecureHsoftwareHrequirements?H-HCORRECTHANSWERH-
GatheringHtheHsoftwareHrequirements,HdataHclassification,HandHmanagingHdataHprotectionHrequire
ments