100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C706 – Secure Software Design Master’s Course | 2025 New & Updated Exam Questions with, Exams of Nursing

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
10-12-2025
Written in
2025/2026

WGU C706 – Secure Software Design Master’s Course | 2025 New & Updated Exam Questions with, Exams of Nursing

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
December 10, 2025
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C706 – Secure Software Design Master’s
Course | 2025 New & Updated Exam Questions
with, Exams of Nursing
Which type of malicious attack uses Visual Basic scripting?



A dumpster diving attack

B denial of service attack

C Trojan horse attack

D social engineering attack C

All of the following are countermeasures for session management attacks, EXCEPT:



A Implement pre- and post-validation controls.

B Encrypt cookies that include information about the state of the connection.

C Implement time stamps or time-based validation.

D Implement randomized session IDs. A

Which tool assists in application development design layout as a part of application
development life cycle?



A Aggregation

B Delphi

C Spiral

D CASE D

What is a characteristic of maintaining logs in a system?



A Logging provides access control by authenticating user credentials.


1|Page

,B Logging helps an administrator to detect security breaches and vulnerable points in a
network.

C Logging provides audit trails but enhances security violations.

D Logging prevents security violations but only deals with passive monitoring. B

Your company has purchased an expert system that uses if-then-else reasoning to obtain more
data than is currently available.



Which expert system processing technique is being implemented?



A forward-chaining technique

B backward-chaining technique

C waterfall model

D spiral model A

Which type of malicious code is hidden inside an otherwise benign program when the program
is written?



A worm

B logic bomb

C Trojan horse

D virus C

Which statement is true of a software development life cycle?



A Parallel testing verifies whether more than one system is available for redundancy.

B A software programmer should be the only person to develop the software, test it, and submit
it to production

C Unit testing should be performed by the developer and the quality assurance team.

D Workload testing should be performed while designing the functional requirements. C


2|Page

,Your organization has several diskless computer kiosks that boot via optical media located in the
office lobby. Recently, users reported that the diskless computers have been infected with a
virus.



What should you do to ensure the virus is removed?



A Launch an anti-virus program on the diskless computers via a USB flash drive.

B Remotely launch an anti-virus program on the diskless computers.

C Reboot the server to which the diskless computers connect.

D Reboot the diskless computers. D

Your company implements several databases. You are concerned with the security of the data in
the databases.



Which statement is correct for database security?



A Data control language (DCL) implements security through access control and granular
restrictions.

B Bind variables provide access control through implementing granular restrictions.

C Data manipulation language (DML) implements access control through authorization.

D Data identification language implements security on data components. A

Which statement is true of a salami attack?



A type of passive attack.

B social engineering technique.

C not an example of data diddling.

D involves stealing small amounts of money from multiple accounts. D




3|Page

, Your company decides that a new software product must be purchased to help the marketing
staff manage their marketing campaigns and the resources used.



During which phase of the software acquisition process do you document the software
requirements?



A Monitoring phase

B Maintaining phase

C Planning phase

D Contracting phase C

You have been tasked with the development of a new application for your organization. You are
engaged in the project initiation phase.



Which activity should you implement during this phase?



A certification and accreditation

B defining formal functional baseline

C functionality and performance tests

D identification of threats and vulnerabilities D

Which Web browser add-in uses Authenticode for security?



A Common Gateway Interface (CGI)

B ActiveX

C Cross-site scripting (XSS)

D Java B

Which statement correctly defines the multipart virus?



4|Page
$13.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
OliviaQuinn

Get to know the seller

Seller avatar
OliviaQuinn Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
9 months
Number of followers
0
Documents
81
Last sold
-
ExamVault

Welcome to ExamVault, your ultimate destination for high-quality, verified study materials trusted by students, educators, and professionals across the globe. We specialize in providing A+ graded exam files, practice questions, complete study guides, and certification prep tailored to a wide range of academic and professional fields. Whether you're preparing for nursing licensure (NCLEX, ATI, HESI, ANCC, AANP), healthcare certifications (ACLS, BLS, PALS, PMHNP, AGNP), standardized tests (TEAS, HESI, PAX, NLN), or university-specific exams (WGU, Portage Learning, Georgia Tech, and more), our documents are 100% correct, up-to-date for 2025/2026, and reviewed for accuracy. What makes ExamVault stand out: ✅ Verified Questions & Correct Answers

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions