100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D487 OA EXAM –QUESTIONS WITH 100% VERIFIED CORRECT ANSWERS SECURE SOFTWARE DESIGN FULLY ACCURATE.

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
10-06-2025
Written in
2024/2025

WGU D487 OA EXAM –QUESTIONS WITH 100% VERIFIED CORRECT ANSWERS SECURE SOFTWARE DESIGN FULLY ACCURATE. This document provides the complete WGU D487 Organizational Systems and Quality Leadership Objective Assessment (OA) with 80 exam questions and 100% verified correct answers. It covers key concepts including healthcare systems, quality improvement, leadership models, regulatory standards, and patient safety. Designed according to the 2025 curriculum, this secure resource supports efficient, high-confidence preparation for passing the D487 OA.

Show more Read less
Institution
WGU D487 OA
Course
WGU D487 OA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 OA
Course
WGU D487 OA

Document information

Uploaded on
June 10, 2025
Number of pages
26
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU D487 OA EXAM –QUESTIONS WITH 100% VERIFIED CORRECT ANSWERS
SECURE SOFTWARE DESIGN FULLY ACCURATE.

What are the two common best principles of software applications in the development process?
Choose 2 answers.
Quality code
Secure code
Information security
Integrity
Availability
Quality code
Secure code
"Quality code" is correct. Quality code is efficient code that is easy to maintain and reusable.
"Secure code" is correct. Secure code authorizes and authenticates every user transaction, logs
the transaction, and denies all unauthorized requisitions.

What ensures that the user has the appropriate role and privilege to view data?
Authentication
Multi-factor authentication
Encryption
Information security
Authorization
Authorization
Authorization ensures a user's information and credentials are approved by the system.

Which security goal is defined by "guarding against improper information modification or
destruction and ensuring information non-repudiation and authenticity"?
Integrity
Quality
Availability
Reliability
Integrity
The data must remain unchanged by unauthorized users and remain reliable from the data entry
point to the database and back.

Which phase in an SDLC helps to define the problem and scope of any existing systems and
determine the objectives of new systems?
Requirements
Design
Planning
Testing
Planning
The planning stage sets the project schedule and looks at the big picture.

What happens during a dynamic code review?
Programmers monitor system memory, functional behavior, response times, and overall

,performance.
Customers perform tests to check software meets requirements.
An analysis of computer programs without executing them is performed.
Input fields are supplied with unexpected input and tested.
Programmers monitor system memory, functional behavior, response times, and overall
performance.

How should you store your application user credentials in your application database?
Use application logic to encrypt credentials
Store credentials as clear text
Store credentials using Base 64 encoded
Store credentials using salted hashes
Store credentials using salted hashes
Hashing is a one-way process that converts a password to ciphertext using hash algorithms.
Password salting adds random characters before or after a password prior to hashing to obfuscate
the actual password.

Which software methodology resembles an assembly-line approach?
V-model
Agile model
Iterative model
Waterfall model
Waterfall model
Waterfall model is a continuous software development model in which the development steps
flow steadily downwards.

Which software methodology approach provides faster time to market and higher business
value?
Iterative model
Waterfall model
V-model
Agile model
Agile model
In the agile model, projects are divided into small incremental builds that provide working
software at the end of each iteration and adds value to business.

In Scrum methodology, who is responsible for making decisions on the requirements?
Scrum Team
Product Owner
ScrumMaster
Technical Lead
Product Owner
The Product Owner is responsible for requirements/backlog items and prioritizing them.

What is the reason software security teams host discovery meetings with stakeholders early in
the development life cycle?

, To determine how much budget is available for new security tools
To meet the development team
To refactor functional requirements to ensure security is included
To ensure that security is built into the product from the start
To ensure that security is built into the product from the start
To correctly and cost-effectively introduce security into the software development life cycle, it
needs to be done early.

Why should a security team provide documented certification requirements during the software
assessment phase?
Certification is required if the organization wants to move to the cloud.
Depending on the environment in which the product resides, certifications may be required by
corporate or government entities before the software can be released to customers.
By ensuring software products are certified, the organization is protected from future litigation.
By ensuring all developers have security certifications before writing any code, teams can forego
discovery sessions.
Depending on the environment in which the product resides, certifications may be required by
corporate or government entities before the software can be released to customers.
Any new product may need to be certified based on the data it stores, the frameworks it uses, or
the domain in which it resides. Those certification requirements need to be analyzed and
documented early in the development life cycle.

What are two items that should be included in the privacy impact assessment plan regardless of
which methodology is used?Choose 2 answers.
Required process steps
Technologies and techniques
SDL project outline
Threat modeling
Post-implementation signoffs
Required process steps
Technologies and techniques
"Required process steps" is correct. Required process steps explain in more detail which
requirements are relevant to developers, detailing what types of data are considered sensitive and
how they need to be protected.
"Technologies and techniques" is correct. Technologies and techniques detail techniques for
meeting legislative requirements in five categories: Confidentiality, Integrity, Availability,
Auditing and Logging, and Authentication.

What are the goals of each SDL deliverable?
Select one of these options for each deliverable:
-Estimate the actual cost of the product
-Identify dependence on unmanaged software
-Map security activities to the development schedule
-Guide security activities to protect the product from vulnerabilities
Product risk profile
SDL project outline

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bettergrades2023 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
33
Member since
3 year
Number of followers
32
Documents
276
Last sold
1 year ago
ALL STUDY GUIDE

4.3

10 reviews

5
7
4
1
3
1
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions