WGU D487 PRE-ASSESSMENT: SECURE SOFTWARE DESIGN (KEO1)
(PKEO)|EXPLORE NEW 60 QUESTIONS AND CORRECT
ANSWERS|LATEST UPDATE 100% VERIFIED|2025 GUIDE
Correct 60
Incorrect 00
SECURE SOFTWARE DESIGN (KEO1) (PKEO)
Questions and answers
1 of 60
Term
A software security team member has created data flow diagrams,
chosen the STRIDE methodology to perform threat reviews, and
created the security assessment for the new product. Which category
of secure software best practices did the team member perform?
Give this one a go later!
, Architecture analysis Source-code analysis
Architecture pattern Policy compliance analysis
Don't know?
2 of 60
Term
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access?
Give this one a go later!
Cryptographic practices Database security
Digital signatures Compliance requirement
Don't know?
3 of 60
Term
Team members are being introduced during sprint zero in the project
kickoff meeting. The person being introduced will be a facilitator, will
try to remove roadblocks and ensure the team is communicating freely,
,and will be responsible for facilitating all scrum ceremonies. Which role
is the team member playing?
Give this one a go later!
Daily scrum Validate all user input
Product owner Scrum master
Don't know?
4 of 60
Term
After determining a reported vulnerability was a credible claim, the
product security incident response team (PSIRT) worked with
development teams to create and test a patch. The patch is scheduled
to be released at the end of the month.What is the response team's
next step?
Give this one a go later!
Identify the team that owns the Notify customers that the fix is
product available
, Identify resources and schedule the Notify the reporter that the case is
fix going to be closed
Don't know?
5 of 60
Term
An organizational security review discovered multiple database
instances that were installed using publicly available default settings,
including security and access. How should the organization remediate
this vulnerability?
Give this one a go later!
Ensure default accounts and
Implement a new database
passwords are disabled or
management system
removed
Increase the physical security of the Upgrade all database instances to
database servers the latest version
Don't know?
6 of 60
Term
(PKEO)|EXPLORE NEW 60 QUESTIONS AND CORRECT
ANSWERS|LATEST UPDATE 100% VERIFIED|2025 GUIDE
Correct 60
Incorrect 00
SECURE SOFTWARE DESIGN (KEO1) (PKEO)
Questions and answers
1 of 60
Term
A software security team member has created data flow diagrams,
chosen the STRIDE methodology to perform threat reviews, and
created the security assessment for the new product. Which category
of secure software best practices did the team member perform?
Give this one a go later!
, Architecture analysis Source-code analysis
Architecture pattern Policy compliance analysis
Don't know?
2 of 60
Term
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access?
Give this one a go later!
Cryptographic practices Database security
Digital signatures Compliance requirement
Don't know?
3 of 60
Term
Team members are being introduced during sprint zero in the project
kickoff meeting. The person being introduced will be a facilitator, will
try to remove roadblocks and ensure the team is communicating freely,
,and will be responsible for facilitating all scrum ceremonies. Which role
is the team member playing?
Give this one a go later!
Daily scrum Validate all user input
Product owner Scrum master
Don't know?
4 of 60
Term
After determining a reported vulnerability was a credible claim, the
product security incident response team (PSIRT) worked with
development teams to create and test a patch. The patch is scheduled
to be released at the end of the month.What is the response team's
next step?
Give this one a go later!
Identify the team that owns the Notify customers that the fix is
product available
, Identify resources and schedule the Notify the reporter that the case is
fix going to be closed
Don't know?
5 of 60
Term
An organizational security review discovered multiple database
instances that were installed using publicly available default settings,
including security and access. How should the organization remediate
this vulnerability?
Give this one a go later!
Ensure default accounts and
Implement a new database
passwords are disabled or
management system
removed
Increase the physical security of the Upgrade all database instances to
database servers the latest version
Don't know?
6 of 60
Term