100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D487: Secure Software Design Study Guide Exam with Questions and Verified Rationalized Answers 100% Guaranteed Pass 2025/2026

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

WGU D487 study guide secure software design exam WGU D487 exam questions secure software design questions WGU D487 rationalized answers secure software design course WGU D487 exam preparation WGU D487 verified answers secure software study guide WGU D487 exam help secure software exam prep WGU D487 study material secure software design certification WGU D487 exam tips secure software design study resources WGU D487 course content WGU secure software design D487 exam sample questions secure software design WGU exam D487 study guide answers WGU secure software exam guide secure software design exam solutions WGU D487 question and answer secure software design practice test WGU D487 online study guide WGU D487 course guide secure software design exam tutorial WGU exam study resources WGU D487 study tools

Show more Read less
Institution
WGU D487
Course
WGU D487











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487
Course
WGU D487

Document information

Uploaded on
December 20, 2024
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D487: Secure Software Design Study Guide
Exam with Questions and Verified Rationalized Answers
100% Guaranteed Pass



1. What are the two common best principles of software applications in the
development process? Choose 2 answers.
Quality code Secure
code Information
security Integrity
Availability: Quality code
Secure code

"Quality code" is correct. Quality code is efficient code that is easy to maintain and
reusable.
"Secure code" is correct. Secure code authorizes and authenticates every user
transaction, logs the transaction, and denies all unauthorized requisitions.
2. What ensures that the user has the appropriate role and privilege to view
data?
Authentication
Multi-factor authentication
Encryption
Information security


,Authorization: Authorization

Authorization ensures a user's information and credentials are approved by the
system.
3. Which security goal is defined by "guarding against improper information
modification or destruction and ensuring information non-repudiation and
authenticity"?
Integrity
Quality
Availability
Reliability: Integrity

The data must remain unchanged by unauthorized users and remain reliable from the
data entry point to the database and back.
4. Which phase in an SDLC helps to define the problem and scope of any
existing systems and determine the objectives of new systems?
Requirements
Design
Planning
Testing: Planning






,The planning stage sets the project schedule and looks at the big picture.
5. What happens during a dynamic code review?
Programmers monitor system memory, functional behavior, response times, and
overall performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is performed. Input
fields are supplied with unexpected input and tested.: Programmers mon- itor
system memory, functional behavior, response times, and overall performance.
6. How should you store your application user credentials in your application
database?
Use application logic to encrypt credentials Store
credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes: Store credentials using salted hashes

Hashing is a one-way process that converts a password to ciphertext using hash
algorithms. Password salting adds random characters before or after a password
prior to hashing to obfuscate the actual password.
7. Which software methodology resembles an assembly-line approach? V-
model
Agile model
Iterative model
Waterfall model: Waterfall model



, Waterfall model is a continuous software development model in which the develop-
ment steps flow steadily downwards.
8. Which software methodology approach provides faster time to market and
higher business value?
Iterative model
Waterfall model
V-model
Agile model: Agile model

In the agile model, projects are divided into small incremental builds that provide
working software at the end of each iteration and adds value to business.
9. In Scrum methodology, who is responsible for making decisions on the
requirements?
Scrum Team

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Excelsolutions Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
547
Member since
1 year
Number of followers
12
Documents
4569
Last sold
1 hour ago
EXCELSOLUTIONS

On this page you will find all documents, Package deals, Test Banks, Solution manuals, WGU, ATI, HESI, ETC........ Always leave a review after purchasing any document so as to make sure our Customers are 100% Satisfied. ALL THE BEST!!!!!!!!!!!!!!!!!!!

3.7

108 reviews

5
46
4
17
3
25
2
6
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions