100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Secure Software Design (LATEST 2025 / 2026 UPDATE), ACTUAL EXAM/TEST QUESTIONS AND 100% VERIFIED ANSWERS | A+ GRADE

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
21-07-2025
Written in
2024/2025

This document provides a comprehensive set of actual exam-style questions and verified answers for WGU D487 Secure Software Design. It covers the Software Development Life Cycle (SDL) phases, PSIRT activities, secure coding best practices, various requirements, threat modeling techniques, vulnerability management, and database security. This material is an excellent resource for WGU students preparing for their D487 exams.

Show more Read less
Institution
D487
Course
D487











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
July 21, 2025
Number of pages
32
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D487 Secure
Software Design
(LATEST
UPDATE), ACTUAL
EXAM/TEST
QUESTIONS AND
100% VERIFIED
ANSWERS | A+
GRADE

,Question 1:

What are Security testing reports used for in A5 Ship?
Correct Answer:
They document findings from different types of security testing in this phase of the SDL.

Question 2:

What is the next step after the PSIRT determines a vulnerability is
credible and high severity?
Correct Answer:
Identify resources and schedule the fix

Question 3:
which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access?
Correct Answer:
cryptographic practice

Question 4:

What is the next step for the Product Security Incident Response Team
(PSIRT) after developing and testing a patch?
Correct Answer:

✔ Notify customers that the fix is available

Question 5:
Which type of requirement specifies that user passwords will require a
minimum of 8 characters and must include at least one uppercase
character, one number, and one special character?
Correct Answer:
Privacy requirement

Question 6:

What is the purpose of Updated threat modeling artifacts in A3 Design &
Development?
Correct Answer:
To maintain data flow diagrams, elements, and threat listings for security analysis.

Question 7:
Security Assessment

,What are the key activities in the Security Assessment phase of SDL?
Correct Answer:
SDL Phase 1 (A1) = SDLC 1 Concept

Software security team is looped in early
Security team hosts a discovery meeting
Software security team discusses project plan
States what further work will be done
Privacy Impact Assessment (PIA) plan is created

Question 8:
SSDL BSIMM
Correct Answer:

SSDL Touchpoints in BSIMM focuses on activities directly related to the software security development lifecycle
(SSDL), including security testing, code review, and architecture analysis.


Question 9:

What is the Open-source licensing review report used for in A5 Ship?
Correct Answer:
To review compliance with licensing requirements if open-source software is used.

Question 10:
What does PSIRT use CVSS scoring for?
Correct Answer:
To prioritize responses to externally discovered vulnerabilities
To determine the severity of security incidents
To modify scores based on factors not captured in the standard CVSS model

Question 11:

What is an Every-Sprint Requirement in Agile SDL?
Correct Answer:

✔ Recurring security tasks that must be implemented in each sprint.

✔ Examples: Input validation, threat modeling, static code analysis.

✔ Ensures continuous security integration throughout development.


Question 12:
What are the four severity levels in CVSS scoring?
Correct Answer:

Critical (C) – CVSS base score of 9.0–10.0

High (H) – CVSS base score of 7.0–8.9

, Medium (M) – CVSS base score of 4.0–6.9

Low (L) – CVSS base score of 0.1–3.9


Question 13:

How should software development organizations handle privacy
response plans?
Correct Answer:

They should either:

Develop their own privacy response plans

Modify the Microsoft SDL Privacy Escalation Response Framework to fit their organization’s needs.


Question 14:
Security Testing Reports
Correct Answer:
A findings summary should be prepared for each type of security testing: manual code review, static analysis,
dynamic analysis, penetration testing, and fuzzing. The reports should provide the type and number of issues
identified and any consistent theme that can be derived from the findings. A4 D&D

Question 15:

What are the four focus areas of BSIMM?
Correct Answer:

Governance – Managing security initiatives.

Intelligence – Collecting security knowledge and tools.

SSDL Touchpoints – Applying security to the software development lifecycle.

Deployment – Security controls for operations.


Question 16:

What does the acronym DREAD stand for in Microsoft's risk model?
Correct Answer:
Damage potential, Reproducibility, Exploitability, Affected users, Discoverability

Question 17:
DREAD
Correct Answer:

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedTechStudyHub Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
37
Member since
1 year
Number of followers
2
Documents
1244
Last sold
6 days ago
BrainBooster

Get access to 100% verified exams, test banks, and study guides for ATI, NURSING, PMHNP, TNCC, USMLE, ACLS, WGU, and many more! We guarantee authentic, high-quality content designed to help you ace your exams with confidence. If you can’t find what you’re looking for, simply contact us — we’ll fetch it for you within minutes! ✅ Trusted by thousands of students ✅ Fast delivery & verified accuracy ✅ Guaranteed success on your next exam Buy with confidence — success starts here!

Read more Read less
4.3

12 reviews

5
7
4
3
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions