100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Secure Software Design WGU C706 – Questions With Comprehensive Solutions

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
01-09-2025
Written in
2025/2026

Secure Software Design WGU C706 – Questions With Comprehensive Solutions

Institution
WGU C706
Course
WGU C706

Content preview

Secure Software Design WGU C706 – Questions With
Comprehensive Solutions

Protecting the software and the systems on which it runs after release, after
dev is complete Accurate Answer:- Application security

Three core elements of security Accurate Answer:- Confidentiality,
integrity, and availability (the C.I.A. model

Tools that look for a fixed set of patterns or rules in the code in a manner
similar to virus-checking programs Accurate Answer:- Static analysis
tools

Ensures that the user has the appropriate role and privilege to view data
Accurate Answer:- Authorization

Ensures that the user is who he or she claims to be and that the data come
from the appropriate place Accurate Answer:- Authentication

Question 4 :

What is responsible for preserving authorized restrictions on information
access and disclosure, including means for protecting personal privacy and
proprietary information? Accurate Answer:- Question 4

Confidentiality

Q5:

What is responsible for guarding against improper information modification
or destruction, and includes ensuring information non-repudiation and
authenticity? Accurate Answer:- Q5:

Integrity

Q6:

,Which concept in the software life cycle understands the potential security
threats to the system, determines risk, and establishes appropriate
mitigations? Accurate Answer:- Q6:

Threat modeling

Q7:

The idea behind is simply to understand the potential security threats to the
system, determine risk, and establish appropriate mitigations. When it is
performed correctly, it occurs early in the project life cycle and can be used to
find security design issues before code is committed. Accurate Answer:-
Q7:

threat modeling

_Q8:

____________is about building secure software: designing software to be secure;
making sure that software is secure; and educating software developers,
architects, and users about how to build security in. Accurate Answer:-
Q8:

software security

Q9:

__________, as the name suggests, is really aimed at developing secure software,
not necessarily quality software Accurate Answer:- Q9:

SDL methodology

The most well-known SDL model is the __________, a process that Microsoft has
adopted for the development of software that needs to withstand malicious
attack. This is considered the most mature of the top three models.
Accurate Answer:- Trustworthy Computing Security Development Lifecycle

_________This is a study of real-world software security initiatives organized so
that you can determine where you stand with your software security initiative

, and how to evolve your efforts over time. It is a set of best practices that
Cigital developed by analyzing real-world data from nine leading software
security initiatives and creating a framework based on common areas of
success. There are 12 practices organized into four domains. These practices
are used to organize the 109 BSIMM activities (BSIMM 4 has a total of 111
activities). Accurate Answer:- BSIMM ( short for Building Security In
Maturity Model.)

_______________provides guidance to help organizations embed security within
their processes, including application lifecycle processes, that help to secure
applications running in the environment. It is a risk-based framework to
continuously improve security through process integration and
improvements in managing applications. It takes a process approach by
design. Accurate Answer:- The ISO/IEC 27034 standard

_____________ is a nonprofit organization dedicated to increasing trust in
information and communications technology products and services through
the advancement of effective software assurance methods. SAFECode is a
global, industry-led effort to identify and promote best practices for
developing and delivering more secure and reliable software, hardware, and
services. Accurate Answer:- The Software Assurance Forum for
Excellence in Code (SAFECode)

______________ is dedicated to improving software assurance by developing
methods to enable software tool evaluations, measuring the effectiveness of
tools and techniques, and identifying gaps in tools and methods. Accurate
Answer:- The NIST SAMATE (Software Assurance Metrics and Tool
Evaluation) project

______________is a list of information security vulnerabilities and exposures that
aims to provide common names for publicly-known problems. This makes it
easier to share data across separate vulnerability capabilities with a common
enumeration. Accurate Answer:- The MITRE Corporation Common
Computer Vulnerabilities and Exposures (CVE)

Three primary tools are basic to the SDL, which are categorized as ____________
Accurate Answer:- fuzzing, static, and dynamic analysis tools.

Written for

Institution
WGU C706
Course
WGU C706

Document information

Uploaded on
September 1, 2025
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ClearMind Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
838
Member since
4 year
Number of followers
673
Documents
6648
Last sold
2 weeks ago
Clear, Exam-Focused Study Notes

ClearMind provides clear, concise, exam-focused notes designed to save time and boost grades. Simplified explanations, structured summaries, and high-yield content trusted by students. Study smarter. Think clearer. I understand how challenging studying can be, which is why I’ve made it my mission to provide you with the best resources to simplify your learning journey. Whether you’re tackling difficult subjects, preparing for exams, or just looking to strengthen your understanding, my carefully crafted study guides, notes, and summaries are designed to meet your unique academic needs. Just like a cozy nest, I want my page to be your go-to space for knowledge, growth, and success. With resources that are clear, concise, and insightful, you’ll feel confident and prepared every step of the way. Thank you for trusting this page with your academic success. Let’s build a foundation for your learning and help you soar to new heights!

Read more Read less
4.1

172 reviews

5
102
4
27
3
22
2
8
1
13

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions