100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D487 QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
30-05-2025
Written in
2024/2025

D487 QUESTIONS & ANSWERS

Institution
D487
Course
D487








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
May 30, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

D487 QUESTIONS & ANSWERS
What is a study of real-world software security initiatives organized so companies can
measure their initiatives and understand how to evolve them over time? - Answers
:Building Security In Maturity Model (BSIMM)

Which secure coding best practice says to use parameterized queries, encrypted
connection strings stored in separate configuration files, and strong passwords or multi-
factor authentication? - Answers :Database security

The software security team is currently working to identify approaches for input
validation, authentication, authorization, and configuration management of a new
software product so they can deliver a security profile. Which threat modeling step is
being described? - Answers :Analyzing the target

Team members are being introduced during sprint zero in the project kickoff meeting.
The person being introduced is a member of the scrum team, responsible for writing
feature logic and attending sprint ceremonies. Which role is the team member playing? -
Answers :Software developer

Which mitigation technique can be used to fight against a data tampering threat? -
Answers :Digital signatures

What is a countermeasure to the web application security frame (ASF) configuration
management threat category? - Answers :Service accounts have no administration
capabilities.

Which type of requirement specifies that credit card numbers displayed in the
application will be masked so they only show the last four digits? - Answers :Privacy
requirement

Which type of requirement specifies that credit card numbers are designated as highly
sensitive confidential personal information? - Answers :Data classification requirement

Which architecture deliverable identifies whether the product adheres to organization
security rules? - Answers :Policy compliance analysis

The project team received a SonarQube report of their most recent stage deployment
that contains 15 vulnerabilities that must be fixed before the product may be released to
production. Which security testing technique is being used? - Answers :Source-code
analysis

Organizational leadership is considering buying a competitor and has asked the
software security team to develop a plan to ensure the competitor's point-of-sale system
complies with organizational policies. Which post-release deliverable is being
described? - Answers :Security strategy for M&A products

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2011
Member since
3 year
Number of followers
1447
Documents
48584
Last sold
8 hours ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions