WGU D487 Pre-Assessment: Secure
Software Design (KEO1)
(PKEO)2026|Actual Exam Questions
And Answers
What is a study of real-world software security initiatives organized so companies
can measure their initiatives and understand how to evolve them over time? -
correct-answer -Building Security In Maturity Model (BSIMM)
What is the analysis of computer software that is performed without executing
programs? - correct-answer -Static analysis
Which International Organization for Standardization (ISO) standard is the
benchmark for information security today? - correct-answer -ISO/IEC 27001.
What is the analysis of computer software that is performed by executing
programs on a real or virtual processor in real time?, - correct-answer -Dynamic
analysis
, 2|Page
Which person is responsible for designing, planning, and implementing secure
coding practices and security testing methodologies? - correct-answer -Software
security architect
A company is preparing to add a new feature to its flagship software product. The
new feature is similar to features that have been added in previous years, and the
requirements are well-documented. The project is expected to last three to four
months, at which time the new feature will be released to customers. Project
team members will focus solely on the new feature until the project ends. Which
software development methodology is being used? - correct-answer -Waterfall
A new product will require an administration section for a small number of users.
Normal users will be able to view limited customer information and should not
see admin functionality within the application. Which concept is being used? -
correct-answer -Principle of least privilege
Security team members have been instructed to document which developers and
analysts will perform product testing and which tools they will use. Which step of
the security test plan is being performed? - correct-answer -Identify internal
resources
Security team members have been instructed to document how many users will
access the new product and what roles those users will play. Which step of the