D487: Secure Software Design Exam
Questions With 100% Verified Answers
What are the two common best principles of software applications
in the development process? Choose 2 answers.
Quality code
Secure code
Information security
Integrity
Availability -
correct answer ✅Quality code
Secure code
"Quality code" is correct. Quality code is efficient code that is easy
to maintain and reusable.
"Secure code" is correct. Secure code authorizes and authenticates
every user transaction, logs the transaction, and denies all
unauthorized requisitions.
What ensures that the user has the appropriate role and privilege
to view data?
Authentication
Multi-factor authentication
Encryption
,D487: Secure Software Design Exam
Questions With 100% Verified Answers
Information security
Authorization -
correct answer ✅Authorization
Authorization ensures a user's information and credentials are
approved by the system.
Which security goal is defined by "guarding against improper
information modification or destruction and ensuring information
non-repudiation and authenticity"?
Integrity
Quality
Availability
Reliability -
correct answer ✅Integrity
The data must remain unchanged by unauthorized users and
remain reliable from the data entry point to the database and back.
Which phase in an SDLC helps to define the problem and scope of
any existing systems and determine the objectives of new systems?
,D487: Secure Software Design Exam
Questions With 100% Verified Answers
Requirements
Design
Planning
Testing -
correct answer ✅Planning
The planning stage sets the project schedule and looks at the big
picture.
What happens during a dynamic code review?
Programmers monitor system memory, functional behavior,
response times, and overall performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is
performed.
Input fields are supplied with unexpected input and tested. -
correct answer ✅Programmers monitor system memory,
functional behavior, response times, and overall performance.
How should you store your application user credentials in your
application database?
, D487: Secure Software Design Exam
Questions With 100% Verified Answers
Use application logic to encrypt credentials
Store credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes -
correct answer ✅Store credentials using salted hashes
Hashing is a one-way process that converts a password to
ciphertext using hash algorithms. Password salting adds random
characters before or after a password prior to hashing to obfuscate
the actual password.
Which software methodology resembles an assembly-line
approach?
V-model
Agile model
Iterative model
Waterfall model -
correct answer ✅Waterfall model
Waterfall model is a continuous software development model in
which the development steps flow steadily downwards.
Questions With 100% Verified Answers
What are the two common best principles of software applications
in the development process? Choose 2 answers.
Quality code
Secure code
Information security
Integrity
Availability -
correct answer ✅Quality code
Secure code
"Quality code" is correct. Quality code is efficient code that is easy
to maintain and reusable.
"Secure code" is correct. Secure code authorizes and authenticates
every user transaction, logs the transaction, and denies all
unauthorized requisitions.
What ensures that the user has the appropriate role and privilege
to view data?
Authentication
Multi-factor authentication
Encryption
,D487: Secure Software Design Exam
Questions With 100% Verified Answers
Information security
Authorization -
correct answer ✅Authorization
Authorization ensures a user's information and credentials are
approved by the system.
Which security goal is defined by "guarding against improper
information modification or destruction and ensuring information
non-repudiation and authenticity"?
Integrity
Quality
Availability
Reliability -
correct answer ✅Integrity
The data must remain unchanged by unauthorized users and
remain reliable from the data entry point to the database and back.
Which phase in an SDLC helps to define the problem and scope of
any existing systems and determine the objectives of new systems?
,D487: Secure Software Design Exam
Questions With 100% Verified Answers
Requirements
Design
Planning
Testing -
correct answer ✅Planning
The planning stage sets the project schedule and looks at the big
picture.
What happens during a dynamic code review?
Programmers monitor system memory, functional behavior,
response times, and overall performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is
performed.
Input fields are supplied with unexpected input and tested. -
correct answer ✅Programmers monitor system memory,
functional behavior, response times, and overall performance.
How should you store your application user credentials in your
application database?
, D487: Secure Software Design Exam
Questions With 100% Verified Answers
Use application logic to encrypt credentials
Store credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes -
correct answer ✅Store credentials using salted hashes
Hashing is a one-way process that converts a password to
ciphertext using hash algorithms. Password salting adds random
characters before or after a password prior to hashing to obfuscate
the actual password.
Which software methodology resembles an assembly-line
approach?
V-model
Agile model
Iterative model
Waterfall model -
correct answer ✅Waterfall model
Waterfall model is a continuous software development model in
which the development steps flow steadily downwards.