100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU Master’s Course C706 – Secure Software Design Exam Questions & Study Guide

Puntuación
-
Vendido
-
Páginas
82
Grado
A+
Subido en
22-01-2026
Escrito en
2025/2026

Prepare effectively for the WGU Master’s Course C706 – Secure Software Design exam with this comprehensive guide. Includes exam-style questions and detailed solutions covering secure coding practices, threat modeling, software lifecycle security, vulnerability mitigation, and risk assessment strategies. Designed for WGU students seeking structured exam preparation, concept mastery, and confidence to excel in C706 assessments.

Mostrar más Leer menos
Institución
WGU C706
Grado
WGU C706











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C706
Grado
WGU C706

Información del documento

Subido en
22 de enero de 2026
Número de páginas
82
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

GU MASTER'S
2026-COURSE
WGU MASTER'S
WGU
C706 MASTER'S
- SECURE
COURSESOFTWARE
COURSE
C706 - SECURE
C706
DESIGN
- SECURE
SOFTWARE
EXAMSOFTWARE
QUESTIONS
DESIGN DESIGN
EXAM
WITHQUESTIONS
CORRECT
EXAM QUESTIONS
ANSWERS
WITH CORRECT
WITH
2025.pdfExam
CORRECT
ANSWERSQuestions
ANSWERS
2025.pdf
and
2025
Answers Grade A




WGU MASTER'S COURSE C706 -
SECURE SOFTWARE DESIGN EXAM
QUESTIONS WITH CORRECT ANSWERS
2025


Which due diligence activity for supply chain security should occur in the initiation phase of the software
acquisition life cycle?



A Developing a request for proposal (RFP) that includes supply chain security risk management

B Lessening the risk of disseminating information during disposal

C Facilitating knowledge transfer between suppliers

D Mitigating supply chain security risk by providing user guidance

A




Which due diligence activity for supply chain security investigates the means by which data sets are
shared and assessed?



A on-site assessment

B process policy review

C third-party assessment

D document exchange and review

D




Consider these characteristics:




GU MASTER'S
WGUCOURSE
MASTER'S
WGU
C706
COURSE
MASTER'S
- SECURE
C706
COURSE
SOFTWARE
- SECURE
C706
SOFTWARE
DESIGN
- SECURE
EXAM
SOFTWARE
DESIGN
QUESTIONS
EXAM
DESIGN
QUESTIONS
WITHEXAM
CORRECT
QUESTIONS
WITHANSWERS
CORRECT
WITH
2025.pdfExam
ANSWERS
CORRECT2025
ANSWERS
Questions 2025.pdf
and Answers Grade A

,GU MASTER'S
2026-COURSE
WGU MASTER'S
WGU
C706 MASTER'S
- SECURE
COURSESOFTWARE
COURSE
C706 - SECURE
C706
DESIGN
- SECURE
SOFTWARE
EXAMSOFTWARE
QUESTIONS
DESIGN DESIGN
EXAM
WITHQUESTIONS
CORRECT
EXAM QUESTIONS
ANSWERS
WITH CORRECT
WITH
2025.pdfExam
CORRECT
ANSWERSQuestions
ANSWERS
2025.pdf
and
2025
Answers Grade A




-Identification of the entity making the access request

-Verification that the request has not changed since its initiation

-Application of the appropriate authorization procedures

-Reexamination of previously authorized requests by the same entity



Which security design analysis is being described?



A Open design

B Complete mediation

C Economy of mechanism

D Least common mechanism

B




Which software security principle guards against the improper modification or destruction of
information and ensures the nonrepudiation and authenticity of information?



A Quality

B Integrity

C Availability

D Confidentiality

B




What type of functional security requirement involves receiving, processing, storing, transmitting, and
delivering in report form?



A Logging

B Error handling




GU MASTER'S
WGUCOURSE
MASTER'S
WGU
C706
COURSE
MASTER'S
- SECURE
C706
COURSE
SOFTWARE
- SECURE
C706
SOFTWARE
DESIGN
- SECURE
EXAM
SOFTWARE
DESIGN
QUESTIONS
EXAM
DESIGN
QUESTIONS
WITHEXAM
CORRECT
QUESTIONS
WITHANSWERS
CORRECT
WITH
2025.pdfExam
ANSWERS
CORRECT2025
ANSWERS
Questions 2025.pdf
and Answers Grade A

,GU MASTER'S
2026-COURSE
WGU MASTER'S
WGU
C706 MASTER'S
- SECURE
COURSESOFTWARE
COURSE
C706 - SECURE
C706
DESIGN
- SECURE
SOFTWARE
EXAMSOFTWARE
QUESTIONS
DESIGN DESIGN
EXAM
WITHQUESTIONS
CORRECT
EXAM QUESTIONS
ANSWERS
WITH CORRECT
WITH
2025.pdfExam
CORRECT
ANSWERSQuestions
ANSWERS
2025.pdf
and
2025
Answers Grade A




C Primary dataflow

D Access control flow

C




Which nonfunctional security requirement provides a way to capture information correctly and a way to
store that information to help support later audits?



A Logging

B Error handling

C Primary dataflow

D Access control flow

A




Which security concept refers to the quality of information that could cause harm or damage if
disclosed?



A Isolation

B Discretion

C Seclusion

D Sensitivity

D




Which technology would be an example of an injection flaw, according to the OWASP Top 10?



A SQL

B API




GU MASTER'S
WGUCOURSE
MASTER'S
WGU
C706
COURSE
MASTER'S
- SECURE
C706
COURSE
SOFTWARE
- SECURE
C706
SOFTWARE
DESIGN
- SECURE
EXAM
SOFTWARE
DESIGN
QUESTIONS
EXAM
DESIGN
QUESTIONS
WITHEXAM
CORRECT
QUESTIONS
WITHANSWERS
CORRECT
WITH
2025.pdfExam
ANSWERS
CORRECT2025
ANSWERS
Questions 2025.pdf
and Answers Grade A

,GU MASTER'S
2026-COURSE
WGU MASTER'S
WGU
C706 MASTER'S
- SECURE
COURSESOFTWARE
COURSE
C706 - SECURE
C706
DESIGN
- SECURE
SOFTWARE
EXAMSOFTWARE
QUESTIONS
DESIGN DESIGN
EXAM
WITHQUESTIONS
CORRECT
EXAM QUESTIONS
ANSWERS
WITH CORRECT
WITH
2025.pdfExam
CORRECT
ANSWERSQuestions
ANSWERS
2025.pdf
and
2025
Answers Grade A




C XML

D XSS

A




A company is creating a new software to track customer balance and wants to design a secure
application.



Which best practice should be applied?



A Develop a secure authentication method that has a closed design

B Allow mediation bypass or suspension for software testing and emergency planning

C Ensure there is physical acceptability to ensure software is intuitive for the users to do their jobs

D Create multiple layers of protection so that a subsequent layer provides protection if a layer is
breached

D




A company is developing a secure software that has to be evaluated and tested by a large number of
experts.



Which security principle should be applied?



A Fail safe

B Open design

C Defense in depth

D Complete mediation

B




GU MASTER'S
WGUCOURSE
MASTER'S
WGU
C706
COURSE
MASTER'S
- SECURE
C706
COURSE
SOFTWARE
- SECURE
C706
SOFTWARE
DESIGN
- SECURE
EXAM
SOFTWARE
DESIGN
QUESTIONS
EXAM
DESIGN
QUESTIONS
WITHEXAM
CORRECT
QUESTIONS
WITHANSWERS
CORRECT
WITH
2025.pdfExam
ANSWERS
CORRECT2025
ANSWERS
Questions 2025.pdf
and Answers Grade A
$21.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MyExamStore Onafhankelijk
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
829
Miembro desde
1 año
Número de seguidores
2
Documentos
750
Última venta
1 mes hace

4.6

5 reseñas

5
4
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes