100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU-C706 TEST PAPER QUESTIONS AND SOLUTIONS 100% CORRECT FOR THE 2026 FINAL.

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
12-12-2025
Written in
2025/2026

WGU-C706 TEST PAPER QUESTIONS AND SOLUTIONS 100% CORRECT FOR THE 2026 FINAL.

Institution
WGU-C706
Course
WGU-C706










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU-C706
Course
WGU-C706

Document information

Uploaded on
December 12, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU-C706 TEST PAPER QUESTIONS AND
SOLUTIONS 100% CORRECT FOR THE 2026
FINAL.

◍ SDL Threat Modeling Tool. Ans: This free tool builds on
Microsoft Visio and provides a tool for constructing graphic
representations for the system without requiring expertise in security
and also has the capability of graphically representing a software
system and identifying vulnerabilities.


◍ Vulnerability Mapping. Ans: Used to determine the most likely
locations within the system in development where an attacker will
strike. This is done on the design phase of the SDLC.


◍ V3. Ans: The highest level of vulnerability. This is a very likely
target for an attacker, such as free text input in a form. These are the
highest priory for a security plan for the system and these should all
be mitigated and accounted for by established control systems in
development.


◍ V2. Ans: A moderate level vulnerability. These are possible but not
probable targets. These will include inter-process communications on
the server or traffic within the trust boundary of the system.
Eavesdropping is the most significant risk in this situation. These
vulnerabilities should always be mitigated in the system, but in a trade
off analysis, strict control may not be necessary as long as a procedure
is in place to fail safely and protect any private or confidential data.

, ◍ V1. Ans: The lowest priority level of vulnerability. These are
unlikely venues of attack with little risk if they are exploited. Failing
safely is the most important concern at this level, because the data
associated with this vulnerability has no value, and the process
involved is not mission critical, such as a transmission failure in an
HTML header coming from the system; the highest risk is that the
customer will
not properly see the page and it would have to be reloaded. These
vulnerabilities can be largely ignored, but they should be noted in the
system specification in case functionality is altered by a later system
update or interaction because this may allow them to become more
significant.


◍ Activity Diagram. Ans: Capable of expressing resolution efforts to
malformed input and potential attacks in a way other documentation
at the system level cannot. The caveat is that these do not contain
class calls and references; they only provide a visualization of the
process logic.


◍ Kiviat Diagram. Ans: Provides a visual comparison of multiple
attributes and can visualize and report the information on a single
artifact based on monitored information.


◍ Identify the Assets. Ans: A threat model process that allows the
company to identify the part that needs to be protected from
unauthorized users.


◍ Agile Model. Ans: Describes a set of principles for software
development under which requirements and solutions evolve through

, the collaborative effort of self-organizing cross-functional teams. It
promotes adaptive planning, evolutionary development, early
delivery, and continuous improvement, and it encourages rapid and
flexible response to change. Supports the definition and continuing
evolution of many software development methods, avoids life cycle
activities, focuses on built-a- little, test-a-little and field-a-little. It also
supports informal communication and Incremental design.


◍ Types of Vulnerability Mapping. Ans: Activity Diagram, Kiviat
Diagram, Identify the Assets, Agile Model, V1, V2, V3


◍ Agile attributes. Ans: Cyclical Process. Supports quick prototyping
and limits the time spent thinking about the problem as a whole.


◍ Waterfall attributes. Ans: Similar to interactive model and main
components are planning, development and deployment.


◍ Chrystal Clear attributes. Ans: Can be applied to teams of up to 6
or 8 co-located developers working on systems that are not life-
critical. This family of methodologies focuses on efficiency and
habitability as components of project safety. Focuses on people, not
processes or artifacts. Roles may be filed by the same people,
including a project manager and a business expert.


◍ Waterfall attributes. Ans: A sequential (non-iterative / Limited
Interaction) design process, used in software development, in which
progress is seen as flowing down through the phases of conception,
initiation, analysis, design, construction, testing,
production/implementation and maintenance. All the requirements

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FocusFile7 Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
15
Member since
5 months
Number of followers
1
Documents
10915
Last sold
2 hours ago
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go-to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top-notch, easy-to-digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Read more Read less
4.0

3 reviews

5
1
4
1
3
1
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions