100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C706 Secure Software Design OBJECTIVE ASSESSMENT ACTUAL EXAM STUDY GUIDE 2025/2026 COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES || 100% GUARANTEED PASS <LATEST VERSION>

Beoordeling
-
Verkocht
-
Pagina's
118
Cijfer
A+
Geüpload op
21-08-2025
Geschreven in
2025/2026

WGU C706 Secure Software Design OBJECTIVE ASSESSMENT ACTUAL EXAM STUDY GUIDE 2025/2026 COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES || 100% GUARANTEED PASS &lt;LATEST VERSION&gt; 1. Security Champion - ANSWER People who take lead in a project such as development leadership, or training to enable support and encourage the adoption of security knowledge and practices through peer leadership, behavior demonstration, and social encouragement. 2. Software Security Architect (SSA) - ANSWER The software architect moves analysis to implementation and analyzes the requirements and use cases as activities to perform as part of the development process. That person can also develop class diagrams. a person who oversees the security aspects of a project, making sure appropriate countermeasures are in place 3. Software Security Evangelist (SSE) - ANSWER A training champion of software security and an advocate for the overall software development lifecycle process and a proponent for promulgating and enforcing the overall security program. promotes software security practices in a team, in a unit, or on a project 4. Software Security Stakeholder (SSS) - ANSWER A stakeholder has ownership interest in a program or a project and has a vested interest in the success of the project functionally and from a security perspective. The head of HR would be a stakeholder in a payroll project. 5. Functional Acceptance Criteria - ANSWER Describes the behavior of the system as it relates to the systems functionality. ex: send an email when a condition is met 6. NonFunctional Acceptance Criteria - ANSWER Form measurable criteria that can be used to gauge the success of an overall system solution or product. Example: Review test results, areas such as efficiency, privacy, confidentiality, etc 7. Fuzz testing - ANSWER invalid, unexpected, or random data provided to inputs. 8. Strategic Attacks - ANSWER user general targeting against a broad industry. Highly repeatable. 9. Tactical Attacks - ANSWER surgical by nature, have highly specific targeting, and are technologically sophisticated 10. User Specific attacks - ANSWER can be strategic, tactical, or personal in nature, and target personal devices that may be either consumer or enterprise owned. attacking the user instead of the system. 11. Sociopolitical attacks - ANSWER intended to elevate awareness of a topic 12. Privacy Impact Assessment (PIA) - ANSWER The activities for compliance include ensuring collected information is only used for intended purposes, information is timely and accurate, and the public is aware of how the the information is collected and how it is used. 13. PA-DSS (Payment Application Data Security Standard) - ANSWER PA DSS is explicitly focused on payment applications. PA-DSS is a set of requirements intended to help software vendors develop secure payment applications for credit cards. 14. PCI DSS (Payment Card Industry Data Security Standard) - ANSWER A set of standards that are intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. 15. PTS DSS (Pin Transaction Security Data Security Standard) - ANSWER intended to protect all POS devices and terminals, included attended and unattended terminal devices. 16. Which due diligence activity for supply chain security should occur in the initiation phase of the software acquisition life cycle? - ANSWER Developing a request for proposal (RFP) that includes supply chain security risk management 17. Which due diligence activity for supply chain security investigates the means by which data sets are shared and assessed? - ANSWER A document exchange and review 18. Identification of the entity making the access request Verification that the request has not changed since its initiation Application of the appropriate authorization procedures Reexamination of previously authorized requests by the same entity Which security design analysis is being described? - ANSWER Complete mediation 19. Which software security principle guards against the improper modification or destruction of information and ensures the nonrepudiation and authenticity of information? - ANSWER Integrity 20. What type of functional security requirement involves receiving, processing, storing, transmitting, and delivering in report form? - ANSWER Primary dataflow 21. Which nonfunctional security requirement provides a way to capture information correctly and a way to store that information to help support later audits? - ANSWER Logging 22. Which security concept refers to the quality of information that could cause harm or damage if disclosed? - ANSWER Sensitivity 23. Which technology would be an example of an injection flaw, according to the OWASP Top 10? - ANSWER SQL 24. A company is creating a new software to track customer balance and wants to design a secure application. 25. Which best practice should be applied? - ANSWER Create multiple layers of protection so that a subsequent layer provides protection if a layer is breached 26. This SDLC role prepares a document plan to verify that the code performs the functions it was supposed to. - ANSWER Tester role 27. ___ _______ is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution. This can be done from any form or place that allows the attacker to enter any type of information which is somewhat connected to a database. - ANSWER SQL injection 28. ______ is a classification scheme for characterizing/measuring known threats/vulnerabilities according to the kinds of exploit that are used (or motivation of the attacker). It also focuses on the end results of possible attacks rather than on the identification of each specific attack - ANSWER STRIDE 29. S in STRIDE stands for... - ANSWER Spoofing Identity 30. T in STRIDE stands for... - ANSWER Tampering with Data 31. R in STRIDE stands for... - ANSWER Repudiation 32. I in STRIDE stands for... - ANSWER Information Disclosure 33. D in STRIDE stands for... - ANSWER Denial of Service 34. E in STRIDE stands for... - ANSWER Elevation of Privilege 35. _____ is part of a system for risk-assessing computer security threats previously used at Microsoft and currently used by OpenStack and many other corporations. It provides a mnemonic for risk rating security threats using five categories. - ANSWER DREAD 36. D in DREAD stands for... - ANSWER Damage and Discoverability 37. R in DREAD stands for... - ANSWER Reproducibility 38. E in DREAD stands for... - ANSWER Exploitability/Vulnerability 39. A in DREAD stands for... - ANSWER Affected users 40. A _____ ______ is a diagram and description that tells a story of how an attacker could exploit the vulnerability. - ANSWER threat model 41. How are each exploits graded and prioritized using DREAD? - ANSWER Each category is given a score (3-High, 2-Med, 1-Low, 0-None). Scores are added up to determine priority of threat. 42. _-___ defines a set of threat-relevant attributes for each layers or nodes. These attributes can be classified as either probability-relevant, size-of-loss relevant, or descriptive. These class attributes are primarily derived from Common Vulnerability Scoring System (CVSS). - ANSWER T-MAP 43. Project Definition, User Requirements Definition and Systems Requirement Definition are all part of this SDLC Management Control Domain. - ANSWER Planning / Organization 44. User Requirements Definition, System Requirement Definition, Analysis and Design and System Build / Prototype / Pilot are all part of this SDLC Management Control Domain - ANSWER Acquisition / Implementation 45. Analysis and Design, System Build / Prototype / Pilot, Implementation and Training and Sustainment are all part of this SDLC Management Control Domain - ANSWER Delivery and Support

Meer zien Lees minder
Instelling
WGU C706 Secure Software Design
Vak
WGU C706 Secure Software Design











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C706 Secure Software Design
Vak
WGU C706 Secure Software Design

Documentinformatie

Geüpload op
21 augustus 2025
Aantal pagina's
118
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

  • 100 guaranteed pass
  • latest ver

Voorbeeld van de inhoud

WGU C706 Secure Software Design OBJECTIVE
ASSESSMENT ACTUAL EXAM STUDY GUIDE 2025/2026
COMPLETE QUESTIONS AND CORRECT DETAILED
ANSWERS WITH RATIONALES || 100% GUARANTEED
PASS
<LATEST VERSION>



1. Security Champion - ANSWER ✓ People who take lead in a project such as
development leadership, or training to enable support and encourage the
adoption of security knowledge and practices through peer leadership,
behavior demonstration, and social encouragement.

2. Software Security Architect (SSA) - ANSWER ✓ The software architect
moves analysis to implementation and analyzes the requirements and use
cases as activities to perform as part of the development process. That
person can also develop class diagrams.

a person who oversees the security aspects of a project, making sure
appropriate countermeasures are in place

3. Software Security Evangelist (SSE) - ANSWER ✓ A training champion of
software security and an advocate for the overall software development
lifecycle process and a proponent for promulgating and enforcing the overall
security program.

promotes software security practices in a team, in a unit, or on a project

4. Software Security Stakeholder (SSS) - ANSWER ✓ A stakeholder has
ownership interest in a program or a project and has a vested interest in the
success of the project functionally and from a security perspective. The head
of HR would be a stakeholder in a payroll project.

,5. Functional Acceptance Criteria - ANSWER ✓ Describes the behavior of the
system as it relates to the systems functionality.

ex: send an email when a condition is met

6. NonFunctional Acceptance Criteria - ANSWER ✓ Form measurable criteria
that can be used to gauge the success of an overall system solution or
product.

Example: Review test results, areas such as efficiency, privacy,
confidentiality, etc

7. Fuzz testing - ANSWER ✓ invalid, unexpected, or random data provided to
inputs.

8. Strategic Attacks - ANSWER ✓ user general targeting against a broad
industry. Highly repeatable.

9. Tactical Attacks - ANSWER ✓ surgical by nature, have highly specific
targeting, and are technologically sophisticated

10.User Specific attacks - ANSWER ✓ can be strategic, tactical, or personal in
nature, and target personal devices that may be either consumer or enterprise
owned.

attacking the user instead of the system.

11.Sociopolitical attacks - ANSWER ✓ intended to elevate awareness of a topic

12.Privacy Impact Assessment (PIA) - ANSWER ✓ The activities for
compliance include ensuring collected information is only used for intended
purposes, information is timely and accurate, and the public is aware of how
the the information is collected and how it is used.

13.PA-DSS (Payment Application Data Security Standard) - ANSWER ✓ PA-
DSS is explicitly focused on payment applications.
PA-DSS is a set of requirements intended to help software vendors develop
secure payment applications for credit cards.

,14.PCI DSS (Payment Card Industry Data Security Standard) - ANSWER ✓ A
set of standards that are intended to ensure that all companies that process,
store, or transmit credit card information maintain a secure environment.

15.PTS DSS (Pin Transaction Security Data Security Standard) - ANSWER ✓
intended to protect all POS devices and terminals, included attended and
unattended terminal devices.

16.Which due diligence activity for supply chain security should occur in the
initiation phase of the software acquisition life cycle? - ANSWER ✓
Developing a request for proposal (RFP) that includes supply chain security
risk management

17.Which due diligence activity for supply chain security investigates the
means by which data sets are shared and assessed? - ANSWER ✓ A
document exchange and review

18.Identification of the entity making the access request
Verification that the request has not changed since its initiation
Application of the appropriate authorization procedures
Reexamination of previously authorized requests by the same entity
Which security design analysis is being described? - ANSWER ✓ Complete
mediation

19.Which software security principle guards against the improper modification
or destruction of information and ensures the nonrepudiation and
authenticity of information? - ANSWER ✓ Integrity

20.What type of functional security requirement involves receiving, processing,
storing, transmitting, and delivering in report form? - ANSWER ✓ Primary
dataflow

21.Which nonfunctional security requirement provides a way to capture
information correctly and a way to store that information to help support
later audits? - ANSWER ✓ Logging

, 22.Which security concept refers to the quality of information that could cause
harm or damage if disclosed? - ANSWER ✓ Sensitivity

23.Which technology would be an example of an injection flaw, according to
the OWASP Top 10? - ANSWER ✓ SQL

24.A company is creating a new software to track customer balance and wants
to design a secure application.

25.Which best practice should be applied? - ANSWER ✓ Create multiple layers
of protection so that a subsequent layer provides protection if a layer is
breached

26.This SDLC role prepares a document plan to verify that the code performs
the functions it was supposed to. - ANSWER ✓ Tester role

27.___ _______ is a code injection technique, used to attack data-driven
applications, in which nefarious SQL statements are inserted into an entry
field for execution. This can be done from any form or place that allows the
attacker to enter any type of information which is somewhat connected to a
database. - ANSWER ✓ SQL injection

28.______ is a classification scheme for characterizing/measuring known
threats/vulnerabilities according to the kinds of exploit that are used (or
motivation of the attacker). It also focuses on the end results of possible
attacks rather than on the identification of each specific attack - ANSWER ✓
STRIDE

29.S in STRIDE stands for... - ANSWER ✓ Spoofing Identity

30.T in STRIDE stands for... - ANSWER ✓ Tampering with Data

31.R in STRIDE stands for... - ANSWER ✓ Repudiation

32.I in STRIDE stands for... - ANSWER ✓ Information Disclosure

33.D in STRIDE stands for... - ANSWER ✓ Denial of Service

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ProfBenjamin Havard School
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
398
Lid sinds
1 jaar
Aantal volgers
14
Documenten
2813
Laatst verkocht
18 uur geleden
EXCELLENT ACHIEVERS LIBRARY

As a professional tutor, I provide exceptional assistance with homework, quizzes, and exams across various subjects, including Psychology, Nursing, Biological Sciences, Business, Engineering, Human Resource Management, and Mathematics. I am dedicated to offering high-quality support and ensuring that all work meets scholarly standards. To enhance the effectiveness of our services, I work with a team of experienced tutors to create comprehensive and effective revision materials. Together, we are committed to helping students achieve excellent grades through our collaborative efforts and expertise.

Lees meer Lees minder
3.9

73 beoordelingen

5
33
4
11
3
21
2
4
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen