COMPLETE ACCURATE EXAM QUESTIONS WITH DETAILED
VERIFIED ANSWERS (100% CORRECT ANSWERS) /ALREADY
GRADED A+
WGU D487.
Which practice in the Ship (A5) phase of the security development cycle verifies
whether the product meets security mandates? - - ANS - -A5 policy compliance
analysis
Which post-release support activity defines the process to communicate, identify, and
alleviate security threats? - - ANS - -PRSA1: External vulnerability disclosure
response
What are two core practice areas of the OWASP Security Assurance Maturity Model
(OpenSAMM)? - - ANS - -Governance, Construction
Which practice in the Ship (A5) phase of the security development cycle uses tools to
identify weaknesses in the product? - - ANS - -Vulnerability scan
Which post-release support activity should be completed when companies are joining
together? - - ANS - -Security architectural reviews
,Which of the Ship (A5) deliverables of the security development cycle are performed
during the A5 policy compliance analysis? - - ANS - -Analyze activities and standards
Which of the Ship (A5) deliverables of the security development cycle are performed
during the code-assisted penetration testing? - - ANS - -white-box security test
Which of the Ship (A5) deliverables of the security development cycle are performed
during the open-source licensing review? - - ANS - -license compliance
Which of the Ship (A5) deliverables of the security development cycle are performed
during the final security review? - - ANS - -Release and ship
How can you establish your own SDL to build security into a process appropriate for
your organization's needs based on agile? - - ANS - -iterative development
How can you establish your own SDL to build security into a process appropriate for
your organization's needs based on devops? - - ANS - -continuous integration and
continuous deployments
How can you establish your own SDL to build security into a process appropriate for
your organization's needs based on cloud? - - ANS - -API invocation processes
How can you establish your own SDL to build security into a process appropriate for
your organization's needs based on digital enterprise? - - ANS - -enables and
improves business activities
,Which phase of penetration testing allows for remediation to be performed? - - ANS -
-Deploy
Which key deliverable occurs during post-release support? - - ANS - -third-party
reviews
Which business function of OpenSAMM is associated with governance? - - ANS - -
Policy and compliance
Which business function of OpenSAMM is associated with construction? - - ANS - -
Threat assessment
Which business function of OpenSAMM is associated with verification? - - ANS - -
Code review
Which business function of OpenSAMM is associated with deployment? - - ANS - -
Vulnerability management
What is the product risk profile? - - ANS - -A security assessment deliverable that
estimates the actual cost of the product.
A software security team member has been tasked with creating a deliverable that
provides details on where and to what degree sensitive customer information is
collected, stored, or created within a new product offering. What does the team
member need to deliver in order to meet the objective? - - ANS - -Privacy impact
assessment
, What is the first phase in the security development life cycle? - - ANS - -A1 Security
Assessment
What are the three areas of compliance requirements? - - ANS - -Legal, financial,
and industry standards
What term refers to how the system should function based on the environment in
which the system will operate? - - ANS - -operational requirements
During what phase of SDL do all key stakeholders discuss, identify, and have common
understandings of the security and privacy implications, considerations, and
requirements? - - ANS - -A1 Security Assessment
What are the three areas of focus in secure software requirements? - - ANS - -
Gathering the software requirements, data classification, and managing data
protection requirements
During what phase of SDL is an initial project outline for security milestones
developed and integrated into the development project schedule? - - ANS - -A1
Security Assessment
What term means requirements that describe what the system will do and its core
purpose? - - ANS - -functional requirements
What term means requirements that describe any constraints or restrictions on a
design but do not impact the core purpose of the system - - ANS - -non-functional
requirements