100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D487 WGU Secure Software Design Pre- Assessment Exam Guide 2025/2026 (Questions and Correct Answers)

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

WGU secure software design WGU software design pre-assessment secure software exam guide software design questions and answers D487 WGU exam prep secure software design study guide WGU D487 exam questions pre-assessment guide for software design WGU software security test secure software design certification D487 WGU exam guide WGU software design test answers WGU secure software practice test software security exam preparation WGU D487 study material secure software assessment questions WGU software design coursework WGU exam guide for secure design D487 pre-assessment test WGU software design exam preparation WGU exam help for software security secure software design practice questions WGU D487 sample questions WGU software security syllabus software design curriculum WGU secure software exam solutions WGU course exam guide

Show more Read less
Institution
D487 WGU
Course
D487 WGU










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487 WGU
Course
D487 WGU

Document information

Uploaded on
December 20, 2024
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D487 WGU Secure Software Design Pre- Assessment Exam Guide
(Questions and Correct Answers) 100% Verified



1. The security team recently enabled public access to a web application hosted

on a server inside the corporate network. The developers of the appli- cation

report that the server has received several structured query language (SQL)

injection attacks in the past several days. The team needs to deploy a solution

that will block the SQL injection attacks. Which solution fulfills these

requirements?: Web application firewall (WAF)

2. An IT security team has been notified that external contractors are using

their personal laptops to gain access to the corporate network. The team

needs to recommend a solution that will prevent unapproved devices from

accessing the network. Which solution fulfills these requirements?: Imple-

menting port security

3. The chief technology officer for a small publishing company has been tasked

with improving the company's security posture. As part of a network upgrade,

the company has decided to implement intrusion detection, spam filtering,

content filtering, and antivirus controls. The project needs to be completed

1/
23

,using the least amount of infrastructure while meeting all require- ments. Which

solution fulfills these requirements?: Deploying a unified threat management

(UTM) appliance

4. The security team plans to deploy an intrusion detection system (IDS)

solution to alert engineers about inbound threats. The team already has a

database of signatures that they want the IDS solution to validate. Which

detection technique meets the requirements?: Signature-based detection

5. An IT organization had a security breach after deploying an update to its

production web servers. The application currently goes through a manual

update process a few times per year. The security team needs to recommend a

failback option for future deployments. Which solution fulfills these require-

ments?: Implementing versioning

6. A software development team is working on a new mobile application that will

be used by customers. The security team must ensure that builds of the

application will be trusted by a variety of mobile devices.Which solution fulfills

these requirements?: Code signing

7. An IT organization recently suffered a data leak incident. Management has

asked the security team to implement a print blocking mechanism for all

2/
23

, documents stored on a corporate file share. Which solution fulfills these

requirements?: Digital rights management (DRM)

8. A company has recently discovered that a competitor is distributing copy-

righted videos produced by the in-house marketing team. Management has

asked the security team to prevent these types of violations in the future. Which

solution fulfills these requirements?: Digital rights management (DRM)




3/
23

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Excelsolutions Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
547
Member since
1 year
Number of followers
12
Documents
4569
Last sold
1 hour ago
EXCELSOLUTIONS

On this page you will find all documents, Package deals, Test Banks, Solution manuals, WGU, ATI, HESI, ETC........ Always leave a review after purchasing any document so as to make sure our Customers are 100% Satisfied. ALL THE BEST!!!!!!!!!!!!!!!!!!!

3.7

108 reviews

5
46
4
17
3
25
2
6
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions