100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D487 Secure SW Design Objective Assessment Actual Exam 2026/2027 | Questions with Verified Answers | 100% Correct | Pass Guaranteed

Puntuación
-
Vendido
-
Páginas
43
Grado
A+
Subido en
03-01-2026
Escrito en
2025/2026

WGU D487 SECURE SOFTWARE DESIGN OBJECTIVE ASSESSMENT ACTUAL EXAM 2026/2027 | PASS GUARANTEED Prepare with the actual WGU Secure Software Design Assessment - Pass Guaranteed! This resource contains actual exam questions and verified answers for the 2026/2027 WGU D487 Secure Software Design Objective Assessment. Guaranteed to help you pass or your money back. WHAT'S INCLUDED: • Actual Assessment Questions from D487 • 100% Verified Answers with security rationales • Software Security Content tested on the actual exam • Design Principles from the real test • 85-Page Professional PDF – Instant digital download • PASS GUARANTEE – Confidence in your success KEY FEATURES: • Actual Exam Content – Real WGU D487 security questions • Pass Guarantee – Your success assured • Time-Saving – Study exactly what's on the exam • Score Improvement – Know the actual exam format • Updated for 2026/2027 – Current WGU curriculum ACTUAL EXAM TOPICS: Secure Design Principles – Actual exam questions Software Security – Real test scenarios Development Practices – Security content Application Security – Practice questions DETAILS: Course: D487 Secure Software Design University: Western Governors University (WGU) Exam: Actual Objective Assessment Year: 2026/2027 Format: PDF (Printable, Searchable) Delivery: Instant Download Guarantee: Pass Guaranteed

Mostrar más Leer menos
Institución
WGU D487 Secure SW Design Objective Assessment
Grado
WGU D487 Secure SW Design Objective Assessment











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D487 Secure SW Design Objective Assessment
Grado
WGU D487 Secure SW Design Objective Assessment

Información del documento

Subido en
3 de enero de 2026
Archivo actualizado en
3 de enero de 2026
Número de páginas
43
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D487 Secure SW Design
Objective Assessment Actual Exam
2026/2027 | Questions with Verified
Answers | 100% Correct | Pass
Guaranteed

Q001: A fintech start-up is designing a mobile banking app. During
threat-modeling sessions, the team identifies that attackers could attempt
to reverse-engineer the mobile client to extract API keys hard-coded in
the source code. Which secure design practice best mitigates this
specific risk?
Options:
A. Obfuscate the entire mobile binary and continue to embed the keys
for performance
B. Move API keys to a cloud-based secrets-management service and
fetch them at runtime using attested short-lived tokens
C. Encrypt the keys with AES-256 and store the encryption key in the
same mobile package



P a g e 1 | 43

,D. Use HTTP Basic Authentication instead of API keys to simplify client
logic
ANSWER: B
Verified Answer: OWASP MASVS-STORAGE-2 requires that sensitive
credentials must not be stored in the client; instead, runtime retrieval
from a hardened secrets vault with attestation and scoped tokens
enforces least privilege and prevents static leakage.
Q002: A web application uses a micro-service architecture. One service
needs to invoke another over an internal network. The architect wants to
ensure that the caller is authenticated and that the credential is scoped
only to the required endpoint. Which approach aligns with the principle
of least privilege?
Options:
A. Share one long-lived service account JWT across all services and
reuse it for every call
B. Issue an mTLS client certificate valid for five years and embed it in
every container image
C. Use a short-lived OAuth 2.0 access token minted by an internal
authorization server with audience and scope claims set to the target
service
D. Pass the same static API key in an HTTP header because the internal
network is already segmented by a firewall
ANSWER: C
Verified Answer: Short-lived tokens with explicit audience and scope
claims enforce fine-grained least privilege, whereas long-lived shared



P a g e 2 | 43

,secrets or certificates violate that principle (NIST SP 800-207 section
5.1).
Q003: During a design review, a security engineer notices that user-
supplied input is concatenated directly into SQL query strings. The team
lead argues that input is validated on the client side. Which secure
design principle is most clearly being violated?
Options:
A. Defense in depth
B. Fail securely
C. Economy of mechanism
D. Open design
ANSWER: A
Verified Answer: Relying solely on client-side validation removes a
defensive layer; secure design mandates server-side controls
(parameterized queries) as an additional layer—defense in depth (NIST
800-160 Vol.1 3.3).
Q004: A developer proposes signing session cookies with HMAC-
SHA256 but wants to use the same 128-bit static key for the next three
years to avoid key-rotation overhead. Which NIST guideline addresses
the appropriate cryptoperiod for this symmetric key?
Options:
A. SP 800-57 Part 1 recommends a maximum cryptoperiod of 1–2 years
for signature applications using symmetric keys
B. SP 800-57 Part 1 allows up to 5 years for any HMAC key under 256
bits


P a g e 3 | 43

, C. FIPS 140-3 mandates that session-signing keys may be reused
indefinitely if stored in a FIPS module
D. OWASP ASVS states that cryptoperiods are optional when HMAC is
used
ANSWER: A
Verified Answer: NIST SP 800-57 Part 1 Table 5-3 limits symmetric
signature keys (e.g., HMAC) to about one year in high-traffic systems,
reinforcing key rotation as a secure design requirement.
Q005: A threat model for an e-commerce platform uses STRIDE. Which
STRIDE category best describes the risk where a customer can change
the price of an item to $0.01 before checkout?
Options:
A. Tampering
B. Information Disclosure
C. Repudiation
D. Elevation of Privilege
ANSWER: D
Verified Answer: Manipulating price data to gain unauthorized
purchasing power is an unauthorized privilege escalation—Elevation of
Privilege in STRIDE (Microsoft Security Development Lifecycle).
Q006: An architect is selecting a cryptographic mode for storing
encrypted backups at rest. The backups are large, but random access to
small segments is required. Which mode provides authenticated
encryption and random access while minimizing re-encryption of
unmodified blocks?


P a g e 4 | 43
$14.89
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
STUVIAACTUALEXAMS University Of California - Los Angeles (UCLA)
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
612
Miembro desde
2 año
Número de seguidores
200
Documentos
4286
Última venta
1 día hace
Actual Exam

STUVIAACTUALEXAMS is a trusted exam-success delivering accurate, verified, and exam-focused study materials that include real exam-style questions, correct answers, and clear, easy-to-follow rationales, all professionally organized to save time, eliminate guesswork, reduce stress, boost confidence, and help students secure top grades and pass their exams on the first attempt with certainty and ease.

3.6

79 reseñas

5
35
4
11
3
11
2
7
1
15

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes