100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU MASTER'S COURSE C706 - SECURE SOFTWARE DESIGN INFORMATION TECHNOLOGY COURSE 2025/2026 | QUESTION BANK | VERIFIED QUESTIONS AND ANSWERS GRADED A+ | SOFTWARE SECURITY & SYSTEM DESIGN STUDY GUIDE | GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
107
Grade
A+
Uploaded on
29-11-2025
Written in
2025/2026

WGU MASTER'S COURSE C706 - SECURE SOFTWARE DESIGN INFORMATION TECHNOLOGY COURSE 2025/2026 | QUESTION BANK | VERIFIED QUESTIONS AND ANSWERS GRADED A+ | SOFTWARE SECURITY & SYSTEM DESIGN STUDY GUIDE | GUARANTEED SUCCESS

Institution
WGU MASTER\\\'S COURSE C706 - SECURE SOFTWARE DESIGN
Course
WGU MASTER\\\'S COURSE C706 - SECURE SOFTWARE DESIGN











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU MASTER\\\'S COURSE C706 - SECURE SOFTWARE DESIGN
Course
WGU MASTER\\\'S COURSE C706 - SECURE SOFTWARE DESIGN

Document information

Uploaded on
November 29, 2025
Number of pages
107
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU MASTER S COURSE C706 SECURE SOFTWARE

DESIGN INFORMATION TECHNOLOGY COURSE

2025/2026 | QUESTION BANK | VERIFIED QUESTIONS

AND ANSWERS GRADED A+ | SOFTWARE SECURITY &

SYSTEM DESIGN STUDY GUIDE | GUARANTEED

SUCCESS

What is a step for constructing a threat model for a project when using
practical risk analysis?



A Align your business goals

B Apply engineering methods

C Estimate probability of project time

D Make a list of what you are trying to protect - CORRECT ANSWER -D



Which cyber threats are typically surgical by nature, have highly specific
targeting, and are technologically sophisticated?



A Tactical attacks

B Criminal attacks

C Strategic attacks

,D User-specific attacks - CORRECT ANSWER -A



Which type of cyberattacks are often intended to elevate awareness of a
topic?



A Cyberwarfare

B Tactical attacks

C User-specific attacks

D Sociopolitical attacks - CORRECT ANSWER -D



What type of attack locks a user's desktop and then requires a payment to
unlock it?



A Phishing

B Keylogger

C Ransomware

D Denial-of-service - CORRECT ANSWER -C



What is a countermeasure against various forms of XML and XML path
injection attacks?

,A XML name wrapping

B XML unicode encoding

C XML attribute escaping

D XML distinguished name escaping - CORRECT ANSWER -C



Which countermeasure is used to mitigate SQL injection attacks?



A SQL Firewall

B Projected bijection

C Query parameterization

D Progressive ColdFusion - CORRECT ANSWER -C



What is an appropriate countermeasure to an escalation of privilege attack?



A Enforcing strong password policies

B Using standard encryption algorithms and correct key sizes

C Enabling the auditing and logging of all administration activities

, D Restricting access to specific operations through role-based access
controls - CORRECT ANSWER -D



Which configuration management security countermeasure implements least
privilege access control?



A Following strong password policies to restrict access

B Restricting file access to users based on authorization

C Avoiding clear text format for credentials and sensitive data

D Using AES 256 encryption for communications of a sensitive nature -
CORRECT ANSWER -B



Which phase of the software development life cycle (SDL/SDLC) would be
used to determine the minimum set of privileges required to perform the
targeted task and restrict the user to a domain with those privileges?



A Design

B Deploy

C Development

D Implementation - CORRECT ANSWER -A
$30.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
dukejosh116
5.0
(1)

Get to know the seller

Seller avatar
dukejosh116 Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 month
Number of followers
1
Documents
566
Last sold
6 days ago
ExamHackTutor

WELCOME TO EXAMHACKGURU — THE HOME OF POWERFUL, EXAM-READY STUDY GUIDES! I provide high-quality, exam-focused materials across NURSING, ATI, PMHNP, TNCC, USMLE PREP, WGU COURSES, ENGINEERING, SOCIOLOGY, BUSINESS, MATH, CALCULUS, THEOLOGY, PUBLIC POLICY, ANTHROPOLOGY, MILITARY, ARMY STUDIES, and many more subjects. Every guide is crafted with accuracy, clarity, and deep research to help you understand key concepts faster and prepare with total confidence. My resources are designed around essential exam topics and carefully reviewed to deliver reliable, A-level study support. Your success motivates me to keep producing the best academic materials—thank you for choosing EXAMHACKGURU!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions