100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D487 EXAM QUESTIONS & ANSWERS

Puntuación
-
Vendido
-
Páginas
5
Grado
A+
Subido en
30-05-2025
Escrito en
2024/2025

WGU D487 EXAM QUESTIONS & ANSWERS

Institución
D487
Grado
D487









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D487
Grado
D487

Información del documento

Subido en
30 de mayo de 2025
Número de páginas
5
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D487 EXAM QUESTIONS & ANSWERS
A1 - Security Assessment - Answers :Is the first phase of SDL. This is the phase in
which the project team identifies the project risk profile and the needed SDL activities, in
some SDLs it is called the discovery phase.

A2- Architecture - Answers :At this stage of the SDL, security is looked at more in terms
of business risks, which inputs from the software security group and discussions with
key stakeholders in the SDLC.

A3 - Design and Development - Answers :In this phase the end user of your software is
foremost in your mind. During this phase, you will do an analysis of policy compliance,
create the test plan documentation, , update your threat models if necessary, conduct a
design security analysis, and do a privacy implementation assessment so you can make
informed decisions about how to deploy your software securely and establish
development best practices to detect and remove security and privacy issues early in
the development lifecycle.

A4 - Design and Development - Answers :This phase can be mapped to the "readiness"
phase in a typical software development life cycle (SDLC). In this phase we start the
continuation of policy compliance analysis.

A5 - Ship - Answers :In the final policy compliance review, the SDL policy will be
reviewed to ensure that the policy provides specific requirements based on different
development criteria, such as product type, code type, and platform. A vulnerability scan
will look for any remaining vulnerabilities in your software and associated systems and
report potential exposure.

Scrum Master - Answers :A person who ensures that the team is productive, facilitates
the daily Scrum, enables close cooperation across all roles and functions, and removes
barriers that prevent the team from being effective

Product Owner - Answers :Key stakeholder. Represents the users you're building the
solution for. Often someone from the product management or marketing department.

Scrum Team - Answers :A small group of up to 9 cross-functional developers that is
responsible for developing, testing, and delivering software at the end of a scrum sprint.
The team determines a sprint's major goals and deliverables.

Scrum Ceremonies - Answers :Sprint Planning - Product owner top ideas
Sprint Review - Shows what accomplished during sprint
Sprint Retrospective - How well is scrum working
Daily Scrum - Helps the team stay on track

Scrum Artifacts - Answers :Product Backlog - List of desired features for a product
Sprint backlog - List of tasks to be completed

, Burndown Chart - Updated after every sprint

Sprint - Answers :A fixed length of time period in which a specific set of work is
completed. It is a time-boxed iteration, typically lasting between one to four weeks, with
two weeks being the most common duration.

DREAD - Answers :D - Damage Potential - How catastrophic is the event?
R - Reproducibility - How easy to reproduce the attack?
E - Exploitability - How easy to launch the attack?
A - Affected Users - What percentage of users are affected?
D - Discoverability - How easy it is to find the vulnerability?

STRIDE-Per-Element - Answers :Concentrates on each element of a diagram. Based
on threats common to each type of element.

STRIDE-Per-Interaction - Answers :Concentrates on the interactions of a system. Leads
to threats that are easier to understand.

OCTAVE - Answers :Operationally
Critical
Threat
Asset
Vulnerability Evaluation

*Risk Analysis Framework

*Evaluates Organizations

PASTA - Answers :Process for
Attack
Simulation
Threat Analysis

*Targeted towards medium to large sized companies
*Mature companies
*Having security knowledge
*Iterative
*Outcome is geared towards management

STRIDE Model - Answers :S - Spoofing - How do we ensure a users authenticity?

T - Tampering - How do we check the integrity of our data?

R - Repudiation - How do we audit actions in our systems?

I - Information Disclosure - How do we keep data confidential?
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2011
Miembro desde
3 año
Número de seguidores
1447
Documentos
48584
Última venta
4 horas hace

3.8

345 reseñas

5
172
4
61
3
44
2
16
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes