Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C706 SECURE SOFTWARE DESIGN CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
22-03-2026
Written in
2025/2026

WGU C706 SECURE SOFTWARE DESIGN CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Institution
WGU C706
Course
WGU C706

Content preview

WGU C706 SECURE SOFTWARE DESIGN
CERTIFICATION SCRIPT 2026 QUESTIONS
WITH SOLUTIONS GRADED A+

◍ An application development team is designing and building an application
that interfaces with a back-end database.Which activity should be included
when constructing a threat model for the application?.
Answer: Decompose the application to understand how it interacts with
external entities
◍ SQL injection.
Answer: Inserting SQL statements into an input in the software to alter data
in the database.
◍ STRIDE Threat action aimed to maliciously change/modify persistent data,
such as persistent data in a database, and the alteration of data in transit
between two computers over an open network, such as the
Internet—Integrity is also known as __________________..
Answer: Tampering
◍ A system administrator wants to use physical controls to prevent
unauthorized access to information that belongs to users at a different
security level.Which strategy would prevent this problem?.
Answer: Hardware segmentation
◍ The SDL __________ should outline security milestones based on the
information gained during the previous phase and integrate them into the
overall SDLC schedule to allow proper preparation as changes occur.A
discovery meetingB project planC metricsD impact assessment.
Answer: B
◍ Which attack aims to make web service unavailable or unusable?.

, Answer: Denial-of-service
◍ The metrics to be collected during the Ship (A5) phase of the SDL are
limited to the number, type, and severity of security issues found through
vulnerability scanning and penetration testing. (True or False)A TrueB
False.
Answer: B
◍ Regression Testing.
Answer: Defined as a type of software testing to confirm that a recent
program or code change has not adversely affected existing features.
Nothing but a full or partial selection of already executed test cases that are
re-executed to ensure existing functionalities work fine.
◍ A company is creating a new software to track customer balance and wants
to design a secure application. Which best practice should be applied?.
Answer: Create multiple layers of protection so that a subsequent layer
provides protection if a layer is breached
◍ What is the third step for constructing a threat model for identifying a
spoofing threat?.
Answer: Decompose threats
◍ Which component of the change management process involves new system
deployment testing where the new system and the old system are operating
at the same time?.
Answer: Parallel run
◍ All of the following are countermeasures for session management attacks,
EXCEPT:A Implement pre- and post-validation controls.B Encrypt cookies
that include information about the state of the connection.C Implement time
stamps or time-based validation.D Implement randomized session IDs..
Answer: A
◍ Which form of malicious software hides in the lower levels of an operating
system with privileged access permissions and opens a backdoor on the
system?.

, Answer: Rootkit
◍ Which security concept refers to the quality of information that could cause
harm or damage if disclosed?.
Answer: Sensitivity
◍ Which part of the change management process addresses the needs to
identify, understand, and help leaders manage opposition throughout the
organization?.
Answer: Resistance management
◍ __________ is a white-box security analysis of a software system to
simulate the actions of a hacker, with the objective of uncovering potential
vulnerabilities resulting from coding errors, system configuration faults, or
other operational deployment weaknesses.A Vulnerability scanningB
Penetration testingC Code analysisD Fuzzing.
Answer: B
◍ A system administrator wants to use physical controls to prevent
unauthorized access to information that belongs to users at a different
security level.Which strategy would prevent this problem?.
Answer: Hardware segmentation
◍ Why does privilege creep pose a potential security risk?.
Answer: Users have more privileges than they need and may perform
actions outside their job description.
◍ A bank is developing a new checking account application for customers and
needs to implement a security control that is effective at preventing an
elevation of privilege attack.Which security control is effective at
preventing this threat action?.
Answer: Authorization
◍ The activities for compliance include ensuring collected information is only
used for intended purposes, information is timely and accurate, and the
public is aware of the information collected and how it is used. Which
well-accepted secure development standard is addressed by these activities?.

Written for

Institution
WGU C706
Course
WGU C706

Document information

Uploaded on
March 22, 2026
Number of pages
28
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GradeGalaxy Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
45
Member since
4 months
Number of followers
0
Documents
24873
Last sold
8 hours ago
GradeGalaxy

Welcome to the premier destination for high-quality academic support. GradeGalaxy7 provides a comprehensive suite of educational materials, including expertly sourced test banks, solution manuals, and study guides. Our resources are meticulously organized to streamline your revision process and enhance your understanding of core concepts. Equip yourself with the reliable content you need to achieve superior academic results.

3.5

2 reviews

5
0
4
1
3
1
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions