100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C706 Secure Software Design Study Guide | Questions and Answers | Latest Update 2024/2025 | Assured Success

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
17-07-2025
Written in
2024/2025

This document provides the latest updated study guide for WGU’s C706 Secure Software Design course, featuring verified questions and accurate answers tailored for the 2024/2025 academic year. It covers essential topics including secure coding practices, threat modeling, input validation, authentication and authorization, software architecture security, and OWASP principles. Designed to align with course objectives, this guide is ideal for students aiming to pass with confidence and mastery.

Show more Read less
Institution
Nursing.
Course
Nursing.










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Nursing.
Course
Nursing.

Document information

Uploaded on
July 17, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Secure Software Design Study Guide - C706 questions and
answers 2024\2025 A+ Grade




Confidentiality
- correct answer Information is not made available or disclosed to unauthorized individuals, entities, or
processes. Ensures unauthorized persons are not able to read private and sensitive data. It is achieved
through cryptography.



Integrity
- correct answer Ensures unauthorized persons or channels are not able to modify the data. It is
accomplished through the use of a message digest or digital signatures.



Availability
- correct answer The computing systems used to store and process information, the security controls
used to protect information, and the communication channels used to access information must be
functioning correctly. Ensures system remains operational even in the event of a failure or an attack. It is
achieved by providing redundancy or fault tolerance for a failure of a system and its components.



Ensure Confidentiality
- correct answer Public Key Infrastructure (PKI) and Cryptography/Encryption



Ensure Availability
- correct answer Offsite back-up and Redundancy



Ensure Integrity
- correct answer Hashing, Message Digest (MD5), non repudiation and digital signatures

,Software Architect
- correct answer Moves analysis to implementation and analyzes the requirements and use cases as
activities to perform as part of the development process; can also develop class diagrams.



Security Practitioner Roles
- correct answer Release Manager,

Architect, Developer, Business Analyst/Project Manager



Release Manager
- correct answer Deployment



Architect
- correct answer Design



Developer
- correct answer Coding



Business Analyst/Project Manager
- correct answer Requirements Gathering



Red Team
- correct answer Teams of people familiar with the infrastructure of the company and the languages of
the software being developed. Their mission is to kill the system as the developers build it.



Static Analysis
- correct answer A method of computer program debugging that is done by examining the code without
executing the program. The process provides an understanding of the code structure, and can help to
ensure that the code adheres to industry standards. It's also referred as code review.



MD5 Hash
- correct answer A widely used hash function producing a 128-bit hash value. Initially designed to be
used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can
still be used as a checksum to verify data integrity, but only against unintentional corruption.

, SHA-256 (Secure Hash Algorithm)
- correct answer One of a number of cryptographic hash functions. A cryptographic hash is like a
signature for a text or a data file. Generates an almost-unique, fixed size 32-byte

(32 X 8) hash. Hash is a one-way function - it cannot be decrypted.



Advanced Encryption Standard (AES)
- correct answer A symmetric encryption algorithm. The algorithm was developed by two Belgian
cryptographers Joan Daemen and Vincent Rijmen. Designed to be efficient in both hardware and
software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.



Algorithms used to verify integrity
- correct answer MD5 Hash, SHA-256



Algorithm used to verify confidentiality
- correct answer Advanced Encryption Standard (AES)



Stochastic
- correct answer unintentional or accidental



safety-relevant faults
- correct answer stochastic (i.e., unintentional or accidental)



security-relevant faults
- correct answer "Sponsored," i.e., intentionally created and activated through conscious and intentional
human agency.



Fuzz Testing
- correct answer Used to see if the system has solid exception handling to the input it receives. Is the use
of malformed or random input into a system in order to intentionally produce failure. This is a very easy
process of feeding garbage to the system when it expects a formatted input, and it is always a good idea
to feed as much garbage as possible to an input field.



Three (3) Tier
- correct answer Removes the business logic from the client end of the system. It generally places the

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LECPOPCSTUVIA West Virginia State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
17
Member since
7 months
Number of followers
3
Documents
2441
Last sold
6 days ago
LECPOPC STORE [learn it all]

GET FULL NURSING STUDY GUIDES, SOLUTION MANUALS & TESTBANKS. COMPLETE ,LATEST SOLUTIONS GUIDES TO HELP YOU ACE ON YOUR GRADES . ✅ Verified Questions & Correct Answers LEAVE A REVIEW FOR MATES SATISFACTION, WELCOME ALL.

3.7

3 reviews

5
1
4
0
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions