100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Secure SW Design Objective Assessment Actual Exam 2026/2027 | Questions with Verified Answers | 100% Correct | Pass Guaranteed

Rating
-
Sold
-
Pages
43
Grade
A+
Uploaded on
03-01-2026
Written in
2025/2026

WGU D487 SECURE SOFTWARE DESIGN OBJECTIVE ASSESSMENT ACTUAL EXAM 2026/2027 | PASS GUARANTEED Prepare with the actual WGU Secure Software Design Assessment - Pass Guaranteed! This resource contains actual exam questions and verified answers for the 2026/2027 WGU D487 Secure Software Design Objective Assessment. Guaranteed to help you pass or your money back. WHAT'S INCLUDED: • Actual Assessment Questions from D487 • 100% Verified Answers with security rationales • Software Security Content tested on the actual exam • Design Principles from the real test • 85-Page Professional PDF – Instant digital download • PASS GUARANTEE – Confidence in your success KEY FEATURES: • Actual Exam Content – Real WGU D487 security questions • Pass Guarantee – Your success assured • Time-Saving – Study exactly what's on the exam • Score Improvement – Know the actual exam format • Updated for 2026/2027 – Current WGU curriculum ACTUAL EXAM TOPICS: Secure Design Principles – Actual exam questions Software Security – Real test scenarios Development Practices – Security content Application Security – Practice questions DETAILS: Course: D487 Secure Software Design University: Western Governors University (WGU) Exam: Actual Objective Assessment Year: 2026/2027 Format: PDF (Printable, Searchable) Delivery: Instant Download Guarantee: Pass Guaranteed

Show more Read less
Institution
WGU D487 Secure SW Design Objective Assessment
Course
WGU D487 Secure SW Design Objective Assessment











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 Secure SW Design Objective Assessment
Course
WGU D487 Secure SW Design Objective Assessment

Document information

Uploaded on
January 3, 2026
File latest updated on
January 3, 2026
Number of pages
43
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU D487 Secure SW Design
Objective Assessment Actual Exam
2026/2027 | Questions with Verified
Answers | 100% Correct | Pass
Guaranteed

Q001: A fintech start-up is designing a mobile banking app. During
threat-modeling sessions, the team identifies that attackers could attempt
to reverse-engineer the mobile client to extract API keys hard-coded in
the source code. Which secure design practice best mitigates this
specific risk?
Options:
A. Obfuscate the entire mobile binary and continue to embed the keys
for performance
B. Move API keys to a cloud-based secrets-management service and
fetch them at runtime using attested short-lived tokens
C. Encrypt the keys with AES-256 and store the encryption key in the
same mobile package



P a g e 1 | 43

,D. Use HTTP Basic Authentication instead of API keys to simplify client
logic
ANSWER: B
Verified Answer: OWASP MASVS-STORAGE-2 requires that sensitive
credentials must not be stored in the client; instead, runtime retrieval
from a hardened secrets vault with attestation and scoped tokens
enforces least privilege and prevents static leakage.
Q002: A web application uses a micro-service architecture. One service
needs to invoke another over an internal network. The architect wants to
ensure that the caller is authenticated and that the credential is scoped
only to the required endpoint. Which approach aligns with the principle
of least privilege?
Options:
A. Share one long-lived service account JWT across all services and
reuse it for every call
B. Issue an mTLS client certificate valid for five years and embed it in
every container image
C. Use a short-lived OAuth 2.0 access token minted by an internal
authorization server with audience and scope claims set to the target
service
D. Pass the same static API key in an HTTP header because the internal
network is already segmented by a firewall
ANSWER: C
Verified Answer: Short-lived tokens with explicit audience and scope
claims enforce fine-grained least privilege, whereas long-lived shared



P a g e 2 | 43

,secrets or certificates violate that principle (NIST SP 800-207 section
5.1).
Q003: During a design review, a security engineer notices that user-
supplied input is concatenated directly into SQL query strings. The team
lead argues that input is validated on the client side. Which secure
design principle is most clearly being violated?
Options:
A. Defense in depth
B. Fail securely
C. Economy of mechanism
D. Open design
ANSWER: A
Verified Answer: Relying solely on client-side validation removes a
defensive layer; secure design mandates server-side controls
(parameterized queries) as an additional layer—defense in depth (NIST
800-160 Vol.1 3.3).
Q004: A developer proposes signing session cookies with HMAC-
SHA256 but wants to use the same 128-bit static key for the next three
years to avoid key-rotation overhead. Which NIST guideline addresses
the appropriate cryptoperiod for this symmetric key?
Options:
A. SP 800-57 Part 1 recommends a maximum cryptoperiod of 1–2 years
for signature applications using symmetric keys
B. SP 800-57 Part 1 allows up to 5 years for any HMAC key under 256
bits


P a g e 3 | 43

, C. FIPS 140-3 mandates that session-signing keys may be reused
indefinitely if stored in a FIPS module
D. OWASP ASVS states that cryptoperiods are optional when HMAC is
used
ANSWER: A
Verified Answer: NIST SP 800-57 Part 1 Table 5-3 limits symmetric
signature keys (e.g., HMAC) to about one year in high-traffic systems,
reinforcing key rotation as a secure design requirement.
Q005: A threat model for an e-commerce platform uses STRIDE. Which
STRIDE category best describes the risk where a customer can change
the price of an item to $0.01 before checkout?
Options:
A. Tampering
B. Information Disclosure
C. Repudiation
D. Elevation of Privilege
ANSWER: D
Verified Answer: Manipulating price data to gain unauthorized
purchasing power is an unauthorized privilege escalation—Elevation of
Privilege in STRIDE (Microsoft Security Development Lifecycle).
Q006: An architect is selecting a cryptographic mode for storing
encrypted backups at rest. The backups are large, but random access to
small segments is required. Which mode provides authenticated
encryption and random access while minimizing re-encryption of
unmodified blocks?


P a g e 4 | 43

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUVIAACTUALEXAMS University Of California - Los Angeles (UCLA)
View profile
Follow You need to be logged in order to follow users or courses
Sold
612
Member since
2 year
Number of followers
200
Documents
4286
Last sold
1 day ago
Actual Exam

STUVIAACTUALEXAMS is a trusted exam-success delivering accurate, verified, and exam-focused study materials that include real exam-style questions, correct answers, and clear, easy-to-follow rationales, all professionally organized to save time, eliminate guesswork, reduce stress, boost confidence, and help students secure top grades and pass their exams on the first attempt with certainty and ease.

3.6

79 reviews

5
35
4
11
3
11
2
7
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions