100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Software Security and Development Lifecycle OBJECTIVE ASSESSMENT Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current U

Rating
-
Sold
-
Pages
49
Grade
A+
Uploaded on
12-01-2026
Written in
2025/2026

WGU D487 Software Security and Development Lifecycle OBJECTIVE ASSESSMENT Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. Which SDLC phase focuses on releasing security controls and protections into the production environment? A. Design Phase B. Implementation Phase C. Deployment Phase D. Maintenance Phase Correct Answer: C 2. During which SDLC phase are requirements translated into a technical design? A. Planning Phase B. Design Phase C. Deployment Phase D. Maintenance Phase Correct Answer: B 3. Which SDLC phase determines the resources involved in building the application from known inputs? A. Design Phase B. Implementation Phase C. Testing Phase D. Maintenance Phase Correct Answer: B 4. Which SDLC phase focuses on ongoing monitoring and updates to ensure continued security? A. Deployment Phase B. Testing Phase C. Maintenance Phase D. End-of-Life Phase Correct Answer: C 5. Which SDLC phase establishes the vision, scope, and next steps of a project? A. Requirements Phase B. Design Phase C. Planning Phase D. Implementation Phase Correct Answer: C 6. What best describes secure code? A. Code that runs efficiently B. Code optimized for performance C. Code written following security best practices to prevent ulnerabilities D. Code reviewed after deployment Correct Answer: C 7. Threat modeling is best defined as: A. Testing deployed applications B. A structured process to identify and protect against vulnerabilities C. Writing secure code D. Monitoring system logs Correct Answer: B 8. What are the three core elements of information security (CIA Triad)? A. Confidentiality, Integrity, Authentication B. Confidentiality, Integrity, Availability C. Authentication, Authorization, Accounting D. Integrity, Availability, Authorization Correct Answer: B 9. Which of the following correctly lists the eight phases of the SDLC? A. Planning, Design, Coding, Testing, Deployment, Maintenance B. Requirements, Design, Implementation, Testing, Review C. Planning, Requirements, Design, Implementation, Testing, Deployment, Maintenance, End of Life D. Concept, Build, Test, Release, Monitor Correct Answer: C 10. Software security primarily focuses on: A. Protecting hardware devices B. Securing the foundational logic and code of software C. Managing network traffic D. End-user training Correct Answer: B

Show more Read less
Institution
WGU D487 Software Security And Development
Course
WGU D487 Software Security and Development











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 Software Security and Development
Course
WGU D487 Software Security and Development

Document information

Uploaded on
January 12, 2026
Number of pages
49
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d487

Content preview

WGU D487 Software Security and Development Lifecycle
OBJECTIVE ASSESSMENT Comprehensive Resource
To Help You Ace 2026-2027 Includes Frequently
Tested Questions With ELABORATED 100% Correct
COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!!

Current Update!!


1. Which SDLC phase focuses on releasing security controls and protections
into the production environment?
A. Design Phase
B. Implementation Phase
C. Deployment Phase
D. Maintenance Phase
Correct Answer: C
2. During which SDLC phase are requirements translated into a technical
design?
A. Planning Phase
B. Design Phase
C. Deployment Phase
D. Maintenance Phase
Correct Answer: B
3. Which SDLC phase determines the resources involved in building the
application from known inputs?
A. Design Phase
B. Implementation Phase
C. Testing Phase

, D. Maintenance Phase
Correct Answer: B
4. Which SDLC phase focuses on ongoing monitoring and updates to ensure
continued security?
A. Deployment Phase
B. Testing Phase
C. Maintenance Phase
D. End-of-Life Phase
Correct Answer: C
5. Which SDLC phase establishes the vision, scope, and next steps of a
project?
A. Requirements Phase
B. Design Phase
C. Planning Phase
D. Implementation Phase
Correct Answer: C
6. What best describes secure code?
A. Code that runs efficiently
B. Code optimized for performance
C. Code written following security best practices to prevent vulnerabilities
D. Code reviewed after deployment
Correct Answer: C
7. Threat modeling is best defined as:
A. Testing deployed applications
B. A structured process to identify and protect against vulnerabilities
C. Writing secure code
D. Monitoring system logs
Correct Answer: B
8. What are the three core elements of information security (CIA Triad)?
A. Confidentiality, Integrity, Authentication

, B. Confidentiality, Integrity, Availability
C. Authentication, Authorization, Accounting
D. Integrity, Availability, Authorization
Correct Answer: B
9. Which of the following correctly lists the eight phases of the SDLC?
A. Planning, Design, Coding, Testing, Deployment, Maintenance
B. Requirements, Design, Implementation, Testing, Review
C. Planning, Requirements, Design, Implementation, Testing, Deployment,
Maintenance, End of Life
D. Concept, Build, Test, Release, Monitor
Correct Answer: C
10.Software security primarily focuses on:
A. Protecting hardware devices
B. Securing the foundational logic and code of software
C. Managing network traffic
D. End-user training
Correct Answer: B
11.Which CIA principle prevents unauthorized users from accessing sensitive
information?
A. Integrity
B. Availability
C. Confidentiality
D. Authentication
Correct Answer: C
12.BSIMM is best described as:
A. A security testing tool
B. A regulatory compliance framework
C. A study of real-world software security practices
D. A vulnerability scanning standard
Correct Answer: C

, 13.Dynamic analysis is performed:
A. By reviewing source code only
B. Without executing the program
C. While the program is running in real time
D. After deployment only
Correct Answer: C
14.Fuzz testing involves:
A. Reviewing documentation
B. Supplying invalid or random data to an application
C. Manual penetration testing
D. Reviewing access controls
Correct Answer: B
15.The measure model in software security refers to:
A. Encryption standards
B. A set of data security methods used to protect against vulnerabilities
C. Performance benchmarks
D. Compliance audits
Correct Answer: B
16.A metric model allows organizations to:
A. Identify software bugs
B. Measure employee performance
C. Determine the effectiveness of security controls
D. Enforce compliance
Correct Answer: C
17.OWASP is best described as:
A. A government security agency
B. A static testing tool
C. A flexible framework for building secure software
D. A compliance regulation
Correct Answer: C

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EWLindy Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
710
Member since
3 year
Number of followers
431
Documents
7425
Last sold
2 days ago
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
3.8

107 reviews

5
55
4
13
3
16
2
6
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions