100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU MASTER'S COURSE C702 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+<RECENT VERSION>

Rating
-
Sold
-
Pages
358
Grade
A+
Uploaded on
17-06-2025
Written in
2024/2025

WGU MASTER'S COURSE C702 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+&lt;RECENT VERSION&gt; 1. The __________ requires that in a particular abstraction layer of a computing environment, every module must be able to access only the information and resources that are necessary for its legitimate purpose. A software assurance forum B principle of least privilege C software security maturity model D secure development lifecycle - answer b 2. __________ is an important component of the sdl process and should be considered a system design principle of significant importance in all phases of the sdlc. A failure to protect it will lead to an erosion of trust. authenticity B privacy C confidentiality D integrity - answer b 3. A __________ is a team solely dedicated to conduct security m&a assessments, third-party reviews, post-release certifications, internal reviews for new product combinations of cloud deployments, and review for legacy software that is still in use or about to be re-used. A psirt B sdlc C ncsd D samate - answer a 4. The __________ is a list of information security vulnerabilities and exposures that aims to provide common names for publicly known problems. A ncsd B samate C cve D sdlc - answer c 5. _____________ requirements describe what an application must do to serve a business need. For example, an application must be able to allow a consumer to complete their transaction on the site using a credit card. - answer functional 6. ______________ requirements address how well the functional requirements are met, or to put it another way, they constrain the functional requirements to specified operating ranges. 7. They address areas such as capacity planning, uptime, response times, maintainability, and portability (web, mobile, etc.). Think of them like guardrails on a highway-you are free to operate on the road within the boundaries of the guardrails. - answer nonfunctional 8. He __________ meeting is essentially an sdl kick-off meeting where the key sdlc stakeholders get on the same page at the beginning of the process so that security is built in rather than bolted on post-release. A kickoff B discovery C planning D hotwash - answer b 9. The sdl __________ should outline security milestones based on the information gained during the previous phase and integrate them into the overall sdlc schedule to allow proper preparation as changes occur. A discovery meeting B project plan C metrics D impact assessment - answer b 10. It is important in __________ meetings, when the software security team is included, to ensure that security is a key element of the sdlc and is built into the process. A hot wash B discovery C kick-off D planning - answer c 11. Which requirements describe what an application must do to serve a business need? A fictional requirements B nonfictional requirements C functional requirements D nonfunctional requirements - answer c 12. Which requirements address how well the requirements are met or constrain the requirements to specified operating ranges? A functional requirements B nonfunctional requirements C fictional requirements D nonfictional requirements - answer b 13. The setting of the __________ for any sdl phase will make it more effective and will help in performing post-mortem afterwards to understand what worked and what did not. A discovery meeting B project plan C key success factors D impact assessment - answer c 14. Unless the senior leadership of the development organization and the management team support the sdl, it will likely fail. It must be driven by a policy that is signed off on, promulgated, and provides support by the software development management team and ideally by the ceo. (true or false) A false B true - answer b 15. What are these known as? Steps: 1) identify security objectives 2) survey the application 3) decompose it 4) identify threats 5) identify vulnerabilities - answer the 5 steps of the threat risk modeling process 16. The diagram produced in this stage of the threat modeling process is called a(n) __________ with focus on how data moves through the software solution and what happens to the data as it moves. A data flow diagram (dfd) B tft C stride D mitm - answer a 17. Stride threat action that is designed to illegally access and use another user's credentials, such as username and password—authentication is also known as ___________________. - answer spoofing 18. Stride threat action aimed to maliciously change/modify persistent data, such as persistent data in a database, and the alteration of data in transit between two computers over an open network, such as the internet—integrity is also known as __________________. - answer tampering 19. Stride threat action aimed to perform illegal operations in a system that lacks the ability to trace the prohibited operations—nonrepudiation is also known as _________________. - answer repudiation 20. Stride threat action to read a file that one was not granted access to, or to read data in transit—confidentiality is also known as _____________________. - answer information disclosure 21. Stride threat aimed to deny access to valid users, such as by making a web server temporarily unavailable or unusable—availability is also known as _____________________. - answer denial of service 22. Stride threat aimed to gain privileged access to resources for gaining unauthorized access to information or to compromise a system—authorization is also known as ____________________. - answer elevation of privilege 23. The increasing trend in the software industry to draw on the strengths of various types of software to deliver the highest value at the lowest cost is called __________. A mixed source B shareware C proprietary D open source - answer a 24. The __________ phase determines how pii will be handled to ensure that it conforms to applicable legal, regulatory, and policy requirements regarding privacy. A threat B compliance C analysis D selection - answer c 25. Which exercise requires a special set of skills, experience, and mindset, and requires the team to think like an adversary? A security modeling B exploit modeling C vulnerability modeling D threat modeling - answer d 26. Which artifact lists software requirements and business risks mapped to the three pillars of information security? A formal business requirement B informal business requirement C formal compliance requirement D informal security requirement - answer a 27. Which assessment requires an extensive review that will be conducted by your software security architect, a third party, or a combination of both? A compliance assessment B security assessment C quality assessment D policy assessment - answer b 28. During this phase, any policy that exists outside the domain of the sdl policy is reviewed and might include policies from outside the development organization that set security and privacy requirements and guidelines to be adhered to when developing software or applications. 29. What is this phase? A policy compliance analysis B policy compliance assessment C policy requirements assessment policy compliance review - answer a 30. The __________________ principle requires that completion of a specified sensitive activity or access to sensitive objects is dependent on the satisfaction of multiple conditions. 31. It forces collusion among entities in order to compromise the system. - answer separation of duties 32. ___________ means that if a system fails, it should fail to a state where the security of the system and its data are not compromised. 33. In the situation where system recovery is not done automatically, the failed system should permit access only by the system administrator and not by users, until security controls are reestablished. - answer fail safe 34. _________________ promotes simple and comprehensible design and implementation of protection mechanisms, so that unintended access paths do not exist or can be readily identified and eliminated. - answer economy of mechanism 35. _____________ is where every request by a subject to access an object in a computer system must undergo a valid and effective authorization procedure. - answer complete mediation 36. _________ means that designs that are kept secret versus designs that are open to scrutiny are evaluated by the community at large. - answer open design 37. _______________ states that a minimum number of protective mechanisms should be common to multiple users, as shared access paths can be sources of unauthorized information exchange. Shared access paths that provide unintentional data transfers are known as covert channels. It promotes the least possible sharing of common security mechanisms. - answer least common mechanism 38. Which risk describes the feature, product, or service that stores or transfers personally identifiable information (pii), changes settings or file type associations, or installs software? A low privacy risk B no privacy risk C high privacy risk D moderate privacy risk - answer c 39. __________ is the application of multiple layers of protection, such that a subsequent layer will provide protection if a previous layer is breached. A least privilege B separation of duties C defense in depth D fail safe policy - answer c 40. A __________ means that if a system ceases to function, it moves to a state where the security of the system and its data are not compromised. A fail safe policy B least privilege C separation of duties D defense in depth - answer a 41. An element of security testing is to identify software weaknesses so that security violations and noncompliance with security requirements that could cause the software to fail or be out of compliance with any of software security requirements are avoided. A false B true - answer b A software company suspects that employees have set up automatic corporate email forwarding to their personal inboxes against company policy. The company hires forensic investigators to identify the employees violating policy, with the intention of issuing warnings to them. 42. Which type of cybercrime investigation approach is this company taking? A civil B criminal C administrative D punitive - answer c 43. Which model or legislation applies a holistic approach toward any criminal activity as a criminal operation? A enterprise theory of investigation B racketeer influenced and corrupt organizations act C evidence examination D law enforcement cyber incident reporting - answer a 44. What does a forensic investigator need to obtain before seizing a computing device in a criminal case? A court warrant B completed crime report C chain of custody document D plaintiff's permission - answer a 45. Which activity should be used to check whether an application has ever been installed on a computer? A penetration test B risk analysis C log review D security review - answer c 46. Which characteristic describes an organization's forensic readiness in the context of cybercrimes? A it includes moral considerations. B it includes cost considerations. C it excludes nontechnical actions. D it excludes technical actions. - answer b A cybercrime investigator identifies a universal serial bus (usb) memory stick containing emails as a primary piece of evidence. 47. Who must sign the chain of custody document once the usb stick is in evidence? A those who obtain access to the device B anyone who has ever used the device C recipients of emails on the device D authors of emails on the device - answer a 48. Which type of attack is a denial-of-service technique that sends a large amount of data to overwhelm system resources? A phishing B spamming C mail bombing D bluejacking - answer c 49. Which computer crime forensics step requires an investigator to duplicate and image the collected digital information? A securing evidence B acquiring data C analyzing data D assessing evidence - answer b 50. What is the last step of a criminal investigation that requires the involvement of a computer forensic investigator? A analyzing the data collected B testifying in court C assessing the evidence D performing search and seizure - answer b 51. How can a forensic investigator verify an android mobile device is on, without potentially changing the original evidence or interacting with the operating system? A check to see if it is plugged into a computer B tap the screen multiple times C look for flashing lights D hold down the power button - answer c 52. What should a forensic investigator use to protect a mobile device if a faraday bag is not available? A aluminum foil B sturdy container C cardboard box D bubble wrap - answer a 53. Which criterion determines whether a technology used by government to obtain information in a computer search is considered innovative and requires a search warrant? A availability to the general public B dependency on third-party software C implementation based on open source software D use of cloud-based machine learning - answer a 54. Which situation allows a law enforcement officer to seize a hard drive from a residence without obtaining a search warrant? A the computer is left unattended. B the front door is wide open. C the occupant is acting suspicious. D the evidence is in imminent danger. - answer d 55. Which legal document contains a summary of findings and is used to prosecute? A investigation report B search warrant C search and seizure D chain of custody - answer a 56. What should an investigator use to prevent any signals from reaching a mobile phone? A faraday bag B dry bag C anti-static container D lock box - answer a A forensic investigator is called to the stand as a technical witness in an internet payment fraud case. 57. Which behavior is considered ethical by this investigator while testifying? A providing and explaining facts found during the investigation B interpreting the findings and offering a clear opinion to the jury C helping the jury arrive at a conclusion based on the facts D assisting the attorney in compiling a list of essential questions - answer a A government agent is testifying in a case involving malware on a system.

Show more Read less
Institution
C702
Course
C702











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C702
Course
C702

Document information

Uploaded on
June 17, 2025
Number of pages
358
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU MASTER'S COURSE C702
PRACTICE EXAM QUESTIONS
WITH CORRECT DETAILED
ANSWERS | ALREADY GRADED
A+<RECENT VERSION>




1. The __________ requires that in a particular abstraction layer of a
computing environment, every module must be able to access only the
information and resources that are necessary for its legitimate purpose.


A software assurance forum
B principle of least privilege
C software security maturity model
D secure development lifecycle - answer b


2. __________ is an important component of the sdl process and should be
considered a system design principle of significant importance in all
phases of the sdlc. A failure to protect it will lead to an erosion of trust.


authenticity
B privacy
C confidentiality
D integrity - answer b

,3. A __________ is a team solely dedicated to conduct security m&a
assessments, third-party reviews, post-release certifications, internal
reviews for new product combinations of cloud deployments, and review
for legacy software that is still in use or about to be re-used.


A psirt
B sdlc
C ncsd
D samate - answer a


4. The __________ is a list of information security vulnerabilities and
exposures that aims to provide common names for publicly known
problems.


A ncsd
B samate
C cve
D sdlc - answer c


5. _____________ requirements describe what an application must do to
serve a business need. For example, an application must be able to allow
a consumer to complete their transaction on the site using a credit card. -
answer functional


6. ______________ requirements address how well the functional
requirements are met, or to put it another way, they constrain the
functional requirements to specified operating ranges.


7. They address areas such as capacity planning, uptime, response times,
maintainability, and portability (web, mobile, etc.). Think of them like
guardrails on a highway-you are free to operate on the road within the
boundaries of the guardrails. - answer nonfunctional

,8. He __________ meeting is essentially an sdl kick-off meeting where the
key sdlc stakeholders get on the same page at the beginning of the
process so that security is built in rather than bolted on post-release.


A kickoff
B discovery
C planning
D hotwash - answer b


9. The sdl __________ should outline security milestones based on the
information gained during the previous phase and integrate them into the
overall sdlc schedule to allow proper preparation as changes occur.


A discovery meeting
B project plan
C metrics
D impact assessment - answer b


10.It is important in __________ meetings, when the software security team
is included, to ensure that security is a key element of the sdlc and is built
into the process.


A hot wash
B discovery
C kick-off
D planning - answer c


11.Which requirements describe what an application must do to serve a
business need?

, A fictional requirements
B nonfictional requirements
C functional requirements
D nonfunctional requirements - answer c


12.Which requirements address how well the requirements are met or
constrain the requirements to specified operating ranges?


A functional requirements
B nonfunctional requirements
C fictional requirements
D nonfictional requirements - answer b


13.The setting of the __________ for any sdl phase will make it more
effective and will help in performing post-mortem afterwards to
understand what worked and what did not.


A discovery meeting
B project plan
C key success factors
D impact assessment - answer c


14.Unless the senior leadership of the development organization and the
management team support the sdl, it will likely fail. It must be driven by a
policy that is signed off on, promulgated, and provides support by the
software development management team and ideally by the ceo. (true or
false)


A false
B true - answer b


15.What are these known as?
$18.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
jervismuthami
4.0
(1)

Get to know the seller

Seller avatar
jervismuthami Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
6 months
Number of followers
0
Documents
560
Last sold
3 days ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions