100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Secure Software Design Exam 2026 – Western Governors University | Actual exam versions A & B with complete verified answers

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
02-01-2026
Written in
2025/2026

This document contains the actual WGU D487 Secure Software Design exam for 2026, including both Version A and Version B, with complete and accurate exam questions. All questions are fully answered with detailed, verified solutions, reflecting secure design principles, threat modeling, risk mitigation, and secure SDLC concepts, and the exam is already graded with an A+ result.

Show more Read less
Institution
WGU D487 SECURE SW DESIGN
Course
WGU D487 SECURE SW DESIGN








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 SECURE SW DESIGN
Course
WGU D487 SECURE SW DESIGN

Document information

Uploaded on
January 2, 2026
Number of pages
25
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D487 Secure Software Design Exam 2026 –
Western Governors University | Actual Exam Versions
A & B with Complete Verified Answers.
Q1: Secure Design Principles & Threat Modeling
During threat-modeling a cloud storage service, the team notes that an attacker could re-play a
valid delete request captured earlier. Which STRIDE category is this?

A. Repudiation
B. Tampering
C. Denial of Service
D. Information Disclosure

Answer: A

Rationale: A replayed delete request can allow an attacker to deny the operation ever occurred
or cause unintended deletion, leading to non-repudiation issues. It does not alter data
(Tampering), exhaust resources (DoS), or leak data (Information Disclosure).



Q2: Secure Design Principles & Threat Modeling
A developer proposes embedding API keys inside a mobile app’s obfuscated binary to simplify
deployment. Which principle is MOST directly violated?

A. Security through obscurity
B. Open design
C. Least privilege
D. Separation of duties

Answer: B

Rationale: The Open Design principle states that security should not depend on the secrecy of
the design or implementation. Embedding secrets in code violates this, as the key cannot be
considered secure once distributed.



Q3: Secure Design Principles & Threat Modeling
A micro-service architecture shares a single database schema across all services to save
development time. Which secure design concern is MOST critical?
$19.09
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
StudyGem
5.0
(1)

Get to know the seller

Seller avatar
StudyGem Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
4 months
Number of followers
0
Documents
340
Last sold
8 hours ago
TopTierTutor

Ace your exams with our top-quality study notes & practice papers!

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions