WGU D487 SECURE SOFTWARE DESIGN (2025)
MOST RECENT COMPREHENSIVE QUESTIONS
AND ANSWERS |COMPLETE SOLUTIONS |A+
GRADED |100% CORRECT!!
Save
Terms in this set (60)
What is a study of real- Building Security In Maturity Model (BSIMM)
world software security
initiatives organized so
companies can measure
their initiatives and
understand how to
evolve them over time?,
What is the analysis of Static analysis
computer software that is
performed without
executing programs?
Which International ISO/IEC 27001.
Organization for
Standardization (ISO)
standard is the
benchmark for
information security
today?
https://quizlet.com/1043888581/wgu-d487-secure-software-design-2025-most-recent-comprehensive-questions-and-answers-complete-solutions… 1/19
,5/14/25, 1:14 PM WGU D487 SECURE SOFTWARE DESIGN (2025) MOST RECENT COMPREHENSIVE QUESTIONS AND ANSWERS |COM…
What is the analysis of Dynamic analysis
computer software that is
performed by executing
programs on a real or
virtual processor in real
time?,
Which person is Software security architect
responsible for
designing, planning, and
implementing secure
coding practices and
security testing
methodologies?
A company is preparing Waterfall
to add a new feature to
its flagship software
product. The new feature
is similar to features that
have been added in
previous years, and the
requirements are well-
documented. The project
is expected to last three
to four months, at which
time the new feature will
be released to
customers. Project team
members will focus solely
on the new feature until
the project ends. Which
software development
methodology is being
used?
https://quizlet.com/1043888581/wgu-d487-secure-software-design-2025-most-recent-comprehensive-questions-and-answers-complete-solutions… 2/19
, 5/14/25, 1:14 PM WGU D487 SECURE SOFTWARE DESIGN (2025) MOST RECENT COMPREHENSIVE QUESTIONS AND ANSWERS |COM…
A new product will Principle of least privilege
require an administration
section for a small
number of users. Normal
users will be able to view
limited customer
information and should
not see admin
functionality within the
application. Which
concept is being used?
The scrum team is Daily Scrum
attending their morning
meeting, which is
scheduled at the
beginning of the work
day. Each team member
reports what they
accomplished yesterday,
what they plan to
accomplish today, and if
they have any
impediments that may
cause them to miss their
delivery deadline. Which
scrum ceremony is the
team participating in?
What is a list of Common computer vulnerabilities and exposures
information security (CVE)
vulnerabilities that aims
to provide names for
publicly known
problems?
https://quizlet.com/1043888581/wgu-d487-secure-software-design-2025-most-recent-comprehensive-questions-and-answers-complete-solutions… 3/19