EXAM 2 VERSIONS (VERSION A AND B)
COMPLETE ACCURATE EXAM QUESTIONS
WITH DETAILED VERIFIED ANSWERS (100%
CORRECT ANSWERS) /ALREADY GRADED A+
What is the primary goal of secure software design? - ANSWER-B) To mitigate
security risks throughout the software lifecycle
RATIONALE: The primary goal of secure software design is to mitigate security
risks throughout the software development lifecycle.
Which of the following principles is essential for developing secure software? -
ANSWER-C) Least privilege
RATIONALE: The principle of least privilege ensures that users and systems have
only the access necessary to perform their tasks, reducing potential security risks.
What does "input validation" help to prevent in software applications? -
ANSWER-B) Injection attacks
RATIONALE: Input validation helps to prevent injection attacks by ensuring that
only properly formatted data is processed by the application.
Which of the following is a common method for securing data in transit? -
ANSWER-C) Encryption
RATIONALE: Encryption is commonly used to secure data in transit, protecting it
from interception and unauthorized access.
What is the purpose of threat modeling in secure software design? - ANSWER-B)
To identify potential security threats and vulnerabilities
RATIONALE: Threat modeling aims to identify potential security threats and
vulnerabilities early in the development process to address them proactively.
, Which of the following best describes "secure coding practices"? - ANSWER-B)
Guidelines to prevent security vulnerabilities in code
RATIONALE: Secure coding practices are guidelines designed to prevent security
vulnerabilities during software development
What is a common consequence of failing to implement proper access controls in
software applications? - ANSWER-C) Unauthorized access to sensitive data
RATIONALE: Failing to implement proper access controls can lead to
unauthorized access to sensitive data, increasing the risk of data breaches.
What does "defense in depth" refer to in secure software design? - ANSWER-B)
Using multiple layers of security controls
RATIONALE: Defense in depth involves using multiple layers of security controls
to protect systems and data from various threats.
Where can I get the full WGU D487 exam document? - ANSWER-You can get it
instantly on
https://tinyurl.com/2kanrm5f
Is this the complete exam content? - ANSWER- No — this is a sample.
For the full 250+ verified Q&A with detailed answers, get the official bundle here:
https://tinyurl.com/2kanrm5f
GET THE FULL DOCUMENT - ANSWER-https://tinyurl.com/2kanrm5f