100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C706 SECURE SOFTWARE DESIGN.pdf

Rating
-
Sold
-
Pages
69
Uploaded on
22-10-2024
Written in
2024/2025

WGU C706 SECURE SOFTWARE DESIGN.pdf

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
October 22, 2024
Number of pages
69
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

WGU MASTER'S COURSE C706 - SECURE
SOFTWARE DESIGN EXAM LATEST 2024 ACTUAL
EXAM 300 QUESTIONS AND CORRECT DETAILED
ANSWERS WITH RATIONALES (VERIFIED
ANSWERS) |ALREADY GRADED A+




Which phase of the software development life cycle (SDL/SDLC)
would be used to determine the minimum set of privileges required to
perform the targeted task and restrict the user to a domain with those
privileges?

A Design
B Deploy
C Development
D Implementation - ...ANSWER..A

Which least privilege method is more granular in scope and grants
specific processes only the privileges necessary to perform certain
required functions, instead of granting them unrestricted access to the
system?

A Entitlement privilege
B Separation of privilege
C Aggregation of privileges
D Segregation of responsibilities - ...ANSWER..B

Why does privilege creep pose a potential security risk?

A User privileges do not match their job role.
B With more privileges, there are more responsibilities.
C Auditing will show a mismatch between individual responsibilities
and their access rights.

,D Users have more privileges than they need and may perform actions
outside their job description. - ...ANSWER..D

A system developer is implementing a new sales system. The system
developer is concerned that unauthorized individuals may be able to
view sensitive customer financial data.

Which family of nonfunctional requirements should be considered as
part of the acceptance criteria?

A Integrity
B Availability
C Nonrepudition
D Confidentiality - ...ANSWER..D

A project manager is given the task to come up with nonfunctional
acceptance criteria requirements for business owners as part of a
project delivery.

Which nonfunctional requirement should be applied to the acceptance
criteria?

A Give search options to users
B Evaluate test execution results
C Divide users into groups and give them separate rights
D Develop software that keeps downward compatibility intact -
...ANSWER..B

A user was given a task to identify a nonfunctional acceptance
criteria.

Which nonfunctional requirement should be applied to the acceptance
criteria?

A Encryption used during data transfer
B Review of the most recent test results
C Software developed keeping downward compatibility intact

,D Users divided into groups and the groups given separate rights -
...ANSWER..B

Which technique can be used by an attacker to compromise password
security when a password such as "123456" is used by an
organization?

A Denial-of-service attack
B Brute-force attack
C Blind SQL injection
D Blind XPath injection - ...ANSWER..B

Which type of password attack tests for every possible value of a
parameter?

A Phishing
B Brute force
C DNS poisoning
D Cache poisoning - ...ANSWER..B

Which type of attack allows the complete disclosure or destruction of
all data on a system and allows attackers to spoof identity, tamper
with existing data, and cause repudiation issues such as voiding
transactions or changing balances?

A SQL injection
B Code injection
C Command injection
D Special element injection - ...ANSWER..A

Which threat uses malware that tricks users into believing that there is
no way out for them except to pay to get rid of a nuisance?

A Script kiddies
B Insider threats
C Ransomware
D Bitcoin malware - ...ANSWER..C

, Which type of application attack is used to harvest and steal sensitive
information?

A Whaling
B Remote access tool
C Malicious file execution
D Advanced persistent threat - ...ANSWER..B

Which type of application attack is commonly waged through the use
of rootkits?

A Backdoor
B Time of check
C Rainbow table
D Escalation of privilege - ...ANSWER..D

Which attack aims to make web service unavailable or unusable?

A Spoofing
B Tampering
C Repudiation
D Denial-of-service - ...ANSWER..D

A company is developing a new software application that requires
users to log in using a username and password. The company needs to
implement a security control that is effective at preventing spoofing
during the log-in process.

Which security control is effective at preventing this threat action?

A Integrity
B Authorization
C Authentication
D Confidentiality - ...ANSWER..C
$18.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
MBIUKIA

Get to know the seller

Seller avatar
MBIUKIA Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 year
Number of followers
2
Documents
422
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions