100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

2025 WGU D487 OA TEST BANK 1 WITH 420 QUESTIONS AND CORRECT ANSWERS (100% CORRECT ANSWERS) D487 SECURE SOFTWARE DESIGN OBJECTIVE ASSESSMENT 2025 TEST BANK V1

Rating
1.0
(1)
Sold
-
Pages
120
Grade
A+
Uploaded on
17-01-2025
Written in
2024/2025

2025 WGU D487 OA TEST BANK 1 WITH 420 QUESTIONS AND CORRECT ANSWERS (100% CORRECT ANSWERS) D487 SECURE SOFTWARE DESIGN OBJECTIVE ASSESSMENT 2025 TEST BANK V1

Institution
2025 WGU D487 OA
Course
2025 WGU D487 OA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2025 WGU D487 OA
Course
2025 WGU D487 OA

Document information

Uploaded on
January 17, 2025
Number of pages
120
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d487

Content preview

2025 WGU D487 OA TEST BANK 1 WITH 420
QUESTIONS AND CORRECT ANSWERS
(100% CORRECT ANSWERS) D487 SECURE
SOFTWARE DESIGN OBJECTIVE
ASSESSMENT 2025 TEST BANK V1

A software security team needs to prioritize addressing the most exploitable
weaknesses in their code. They want to reference an established list that
categorizes these vulnerabilities and suggests the most critical areas to focus on.
Which resource should they consult?

A) CWE Top 25
B) OWASP Top 10
C) ISO/IEC 27001
D) SAFECode's Guidelines
A) CWE Top 25
A CEO of a tech company is evaluating the importance of incorporating software
security practices. The CISO presents a report emphasizing that insecure software
poses a high risk, not only from a security perspective but also as a business
decision. Which of the following best describes why software security is critical
for businesses?

A) It enhances user interface design.
B) It mitigates monetary costs and risks associated with insecure software.
C) It increases product features and functionalities.
D) It primarily addresses hardware vulnerabilities.
B) It mitigates monetary costs and risks associated with insecure software.
A software company is discussing the differences between quality code and secure
code. A developer notes that while their application meets quality standards, it
recently experienced a security breach. What is a likely reason for this discrepancy
between quality and secure code?


pg. 1

,A) Quality code ensures security by default, but secure code does not ensure
quality.
B) Quality code focuses on functionality, while secure code focuses on preventing
unauthorized access.
C) Quality code is more expensive to produce than secure code.
D) Secure code generally lacks the usability found in quality code.
B) Quality code focuses on functionality, while secure code focuses on preventing
unauthorized access.
An organization is debating whether to invest in a software security program. The
Chief Technology Officer mentions that software security must be "secure by
design" due to its integration in critical systems. What justifies this need for
secure-by-design software?

A) To support the organization's reputation for innovative features
B) To adhere to customer demand for frequent software updates
C) To reduce the inherent risk in applications used in critical systems
D) To enable faster software release cycles
C) To reduce the inherent risk in applications used in critical systems
A software development company seeks to adopt widely accepted best practices to
improve their secure development lifecycle. They want to learn from real-world
examples of what has proven effective for other industry leaders. Which
organization provides these practical insights and promotes global best practices
for security assurance?

A) OWASP
B) SAFECode
C) NIST
D) BSIMM
B) SAFECode
A development team uses XP and commits to improving the code quality
continuously by regularly restructuring it without changing its functionality. Which
XP practice are they following?



pg. 2

,A) Code refactoring
B) Testing after release
C) Pair programming
D) Static analysis
A) Code refactoring
A stakeholder believes Agile is an unstructured and "do whatever you want"
approach, and thus doubts its effectiveness. What is a common misconception they
have about Agile?

A) Agile is structured and focuses on iterative improvement.
B) Agile emphasizes strict phase-by-phase development.
C) Agile eliminates the need for a project manager.
D) Agile restricts user feedback
A) Agile is structured and focuses on iterative improvement.
A project sponsor assumes that Agile always means there are no deadlines or fixed
project scope. Which Agile misconception does this illustrate?

A) Agile teams avoid fixed project roles.
B) Agile discourages documentation.
C) Agile is entirely unplanned, with no set deadlines.
D) Agile allows for deadlines and scope but includes flexibility for adaptation.
D) Agile allows for deadlines and scope but includes flexibility for adaptation.
The software security group is conducting a maturity assessment using the
Building Security in Maturity Model (BSIMM). They are currently focused on
reviewing security testing results from recently completed initiatives. Which
BSIMM domain is being assessed?

A) Software security development life cycle (SSDL) touchpoints
B) Intelligence
C) Governance
D) Deployment
A) Software security development life cycle (SSDL) touchpoints




pg. 3

, The organization is moving from a waterfall to an agile software development
methodology, so the software security group must adapt the security development
life cycle as well. They have decided to break out security requirements and
deliverables to fit better in the iterative life cycle by defining every-sprint
requirements, one-time requirements, bucket requirements, and final security
review requirements. Which type of requirement states that the team must perform
remote procedure call (RPC) fuzz testing?

A) Bucket requirement
B) One-time requirement
C) Every-sprint requirement
D) Final security review requirement
A) Bucket requirement
The costs to remediate security flaws once a software product is released can run
as much as _______ times the costs to remediate them while still in development:

A) 50
B) 100
C) 500
D) 1500
B) 100
Defective software is:

A) A network security problem
B) An operating system security problem
C) A user-caused problem
D) A software development and engineering problem
D) A software development and engineering problem
The three goals of the security development lifecycle are:

A) Reliability, efficiency, and maintainability
B) Speed, quality, and continuous releases
C) Confidentiality, integrity, and availability
D) Availability, reliability, and portability


pg. 4

Reviews from verified buyers

Showing all reviews
8 months ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
muriithikelvin Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1422
Member since
2 year
Number of followers
559
Documents
2886
Last sold
2 days ago
GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS!

Feeling overwhelmed by exams? We’re here to help. Our study materials help you focus, build confidence, and walk into your exams ready. Compiled using real past exams, these resources give you valuable insight into the kinds of questions to expect and how to approach them — helping you maximize your scores and study smarter. Why Choose Us? Gold-rated seller. 1,250+ happy students. Trusted resources for healthcare and certification success. Friendly support whenever you need it.

Read more Read less
3.9

283 reviews

5
143
4
55
3
41
2
15
1
29

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions