100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D487: Secure Software Design | OA | Objective Assessment | 58 Questions and Answers | 2025 Update | 100% Correct.

Rating
-
Sold
-
Pages
68
Grade
A+
Uploaded on
28-05-2025
Written in
2024/2025

WGU D487: Secure Software Design | OA | Objective Assessment | 58 Questions and Answers | 2025 Update | 100% Correct.

Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Module

Document information

Uploaded on
May 28, 2025
Number of pages
68
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

5/28/25, 12:52 AM D487: Secure Software Design




Correct 58

Incorrect 00




58 Correct terms




Questions and answers



1 of 58

Term


A software security team member has been tasked with creating a
deliverable that provides details on where and to what degree
sensitive customer information is collected, stored, or created within a
new product offering.What does the team member need to deliver in
order to meet the objective?
Threat profile
Privacy impact assessment

,5/28/25, 12:52 AM D487: Secure Software Design

Metrics template
SDL project plan
Give this one a go later!



Privacy impact assessment




A security assessment deliverable that estimates the actual cost of the product

Looking at products from different perspectives allows management to determine
the actual cost of a product, which includes selling it in different markets, and
liabilities that might be incurred.




Estimate the actual cost of the product
Map security activities to the development schedule
Guide security activities to protect the product from vulnerabilities
Identify dependence on unmanaged software



The product risk profile helps management see the actual cost of a product.
The SDL project outline maps security activities to the development schedule.
A threat profile guides the security team on how to protect the product from
threats.
The third-party software list identifies all components the product is using that are
managed outside the organization.




Security that deals with securing the foundational programmatic logic of the
underlying software


Software security focuses on the early stages of the software development life
cycle (SDLC) and the underlying code of a given application.


Don't know?

,5/28/25, 12:52 AM D487: Secure Software Design


2 of 58

Term



A software security team member has been tasked with creating a
threat model for the login process of a new product.What is the first
step the team member should take?
Identify threats
Survey the application
Decompose the application
Identify security objectives



Give this one a go later!



To ensure that security is built into the product from the start


To correctly and cost-effectively introduce security into the software development
life cycle, it needs to be done early.




Threat profile

Threat profiles created in the Security Assessment phase are used to build the
environment in which the product will operate and will include potential threats in
order to determine how to avoid them in the final application.




Order is decided based on value of the items being delivered

Order is decided based on the value of the item/requirement in the backlog as it
helps business when the item is done and business can start using it. The Product
Owner decides the order of items in the backlog.

, 5/28/25, 12:52 AM D487: Secure Software Design

Identify security objectives


An organization must pinpoint what their highest leverage of security
objectives is before the software security team can begin creating the threat
model for the product.


Don't know?




3 of 58

Term



What ensures that the user has the appropriate role and privilege to
view data?
Authentication
Multi-factor authentication
Encryption
Information security
Authorization



Give this one a go later!



Deploy Beta testing


During this phase, the penetration Beta testing samples the intended
test is executed, and any issues will audience to try the product out and
be resolved. analyze its functionality.




Integrity


The data must remain unchanged by

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Wiseman NURSING
Follow You need to be logged in order to follow users or courses
Sold
6690
Member since
4 year
Number of followers
3840
Documents
25981
Last sold
7 hours ago
Testsprint

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

1370 reviews

5
674
4
248
3
210
2
76
1
162

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions