WGU Master's Course C706 - Secure Software
Design EXAM 2026 COMPLETE EXAM
QUESTIONS AND ACCURATE ANSWERS
|ALREADY PASSED!!
Save
Terms in this set (242)
Which due diligence activity for A
supply chain security should occur in
the initiation phase of the software
acquisition life cycle?
A Developing a request for proposal
(RFP) that includes supply chain
security risk management
B Lessening the risk of disseminating
information during disposal
C Facilitating knowledge transfer
between suppliers
D Mitigating supply chain security
risk by providing user guidance
,Which due diligence activity for D
supply chain security investigates the
means by which data sets are shared
and assessed?
A on-site assessment
B process policy review
C third-party assessment
D document exchange and review
Consider these characteristics: B
-Identification of the entity making
the access request
-Verification that the request has not
changed since its initiation
-Application of the appropriate
authorization procedures
-Reexamination of previously
authorized requests by the same
entity
Which security design analysis is
being described?
A Open design
B Complete mediation
C Economy of mechanism
D Least common mechanism
,Which software security principle B
guards against the improper
modification or destruction of
information and ensures the
nonrepudiation and authenticity of
information?
A Quality
B Integrity
C Availability
D Confidentiality
What type of functional security C
requirement involves receiving,
processing, storing, transmitting, and
delivering in report form?
A Logging
B Error handling
C Primary dataflow
D Access control flow
Which nonfunctional security A
requirement provides a way to
capture information correctly and a
way to store that information to help
support later audits?
A Logging
B Error handling
C Primary dataflow
D Access control flow
, Which security concept refers to the D
quality of information that could
cause harm or damage if disclosed?
A Isolation
B Discretion
C Seclusion
D Sensitivity
Which technology would be an A
example of an injection flaw,
according to the OWASP Top 10?
A SQL
B API
C XML
D XSS
Design EXAM 2026 COMPLETE EXAM
QUESTIONS AND ACCURATE ANSWERS
|ALREADY PASSED!!
Save
Terms in this set (242)
Which due diligence activity for A
supply chain security should occur in
the initiation phase of the software
acquisition life cycle?
A Developing a request for proposal
(RFP) that includes supply chain
security risk management
B Lessening the risk of disseminating
information during disposal
C Facilitating knowledge transfer
between suppliers
D Mitigating supply chain security
risk by providing user guidance
,Which due diligence activity for D
supply chain security investigates the
means by which data sets are shared
and assessed?
A on-site assessment
B process policy review
C third-party assessment
D document exchange and review
Consider these characteristics: B
-Identification of the entity making
the access request
-Verification that the request has not
changed since its initiation
-Application of the appropriate
authorization procedures
-Reexamination of previously
authorized requests by the same
entity
Which security design analysis is
being described?
A Open design
B Complete mediation
C Economy of mechanism
D Least common mechanism
,Which software security principle B
guards against the improper
modification or destruction of
information and ensures the
nonrepudiation and authenticity of
information?
A Quality
B Integrity
C Availability
D Confidentiality
What type of functional security C
requirement involves receiving,
processing, storing, transmitting, and
delivering in report form?
A Logging
B Error handling
C Primary dataflow
D Access control flow
Which nonfunctional security A
requirement provides a way to
capture information correctly and a
way to store that information to help
support later audits?
A Logging
B Error handling
C Primary dataflow
D Access control flow
, Which security concept refers to the D
quality of information that could
cause harm or damage if disclosed?
A Isolation
B Discretion
C Seclusion
D Sensitivity
Which technology would be an A
example of an injection flaw,
according to the OWASP Top 10?
A SQL
B API
C XML
D XSS