100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D487 Secure SW Design Objective Assessment Actual Exam 2026/2027 | Questions with Verified Answers | 100% Correct | Pass Guaranteed

Beoordeling
-
Verkocht
-
Pagina's
43
Cijfer
A+
Geüpload op
03-01-2026
Geschreven in
2025/2026

WGU D487 SECURE SOFTWARE DESIGN OBJECTIVE ASSESSMENT ACTUAL EXAM 2026/2027 | PASS GUARANTEED Prepare with the actual WGU Secure Software Design Assessment - Pass Guaranteed! This resource contains actual exam questions and verified answers for the 2026/2027 WGU D487 Secure Software Design Objective Assessment. Guaranteed to help you pass or your money back. WHAT'S INCLUDED: • Actual Assessment Questions from D487 • 100% Verified Answers with security rationales • Software Security Content tested on the actual exam • Design Principles from the real test • 85-Page Professional PDF – Instant digital download • PASS GUARANTEE – Confidence in your success KEY FEATURES: • Actual Exam Content – Real WGU D487 security questions • Pass Guarantee – Your success assured • Time-Saving – Study exactly what's on the exam • Score Improvement – Know the actual exam format • Updated for 2026/2027 – Current WGU curriculum ACTUAL EXAM TOPICS: Secure Design Principles – Actual exam questions Software Security – Real test scenarios Development Practices – Security content Application Security – Practice questions DETAILS: Course: D487 Secure Software Design University: Western Governors University (WGU) Exam: Actual Objective Assessment Year: 2026/2027 Format: PDF (Printable, Searchable) Delivery: Instant Download Guarantee: Pass Guaranteed

Meer zien Lees minder
Instelling
WGU D487 Secure SW Design Objective Assessment
Vak
WGU D487 Secure SW Design Objective Assessment











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D487 Secure SW Design Objective Assessment
Vak
WGU D487 Secure SW Design Objective Assessment

Documentinformatie

Geüpload op
3 januari 2026
Bestand laatst geupdate op
3 januari 2026
Aantal pagina's
43
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D487 Secure SW Design
Objective Assessment Actual Exam
2026/2027 | Questions with Verified
Answers | 100% Correct | Pass
Guaranteed

Q001: A fintech start-up is designing a mobile banking app. During
threat-modeling sessions, the team identifies that attackers could attempt
to reverse-engineer the mobile client to extract API keys hard-coded in
the source code. Which secure design practice best mitigates this
specific risk?
Options:
A. Obfuscate the entire mobile binary and continue to embed the keys
for performance
B. Move API keys to a cloud-based secrets-management service and
fetch them at runtime using attested short-lived tokens
C. Encrypt the keys with AES-256 and store the encryption key in the
same mobile package



P a g e 1 | 43

,D. Use HTTP Basic Authentication instead of API keys to simplify client
logic
ANSWER: B
Verified Answer: OWASP MASVS-STORAGE-2 requires that sensitive
credentials must not be stored in the client; instead, runtime retrieval
from a hardened secrets vault with attestation and scoped tokens
enforces least privilege and prevents static leakage.
Q002: A web application uses a micro-service architecture. One service
needs to invoke another over an internal network. The architect wants to
ensure that the caller is authenticated and that the credential is scoped
only to the required endpoint. Which approach aligns with the principle
of least privilege?
Options:
A. Share one long-lived service account JWT across all services and
reuse it for every call
B. Issue an mTLS client certificate valid for five years and embed it in
every container image
C. Use a short-lived OAuth 2.0 access token minted by an internal
authorization server with audience and scope claims set to the target
service
D. Pass the same static API key in an HTTP header because the internal
network is already segmented by a firewall
ANSWER: C
Verified Answer: Short-lived tokens with explicit audience and scope
claims enforce fine-grained least privilege, whereas long-lived shared



P a g e 2 | 43

,secrets or certificates violate that principle (NIST SP 800-207 section
5.1).
Q003: During a design review, a security engineer notices that user-
supplied input is concatenated directly into SQL query strings. The team
lead argues that input is validated on the client side. Which secure
design principle is most clearly being violated?
Options:
A. Defense in depth
B. Fail securely
C. Economy of mechanism
D. Open design
ANSWER: A
Verified Answer: Relying solely on client-side validation removes a
defensive layer; secure design mandates server-side controls
(parameterized queries) as an additional layer—defense in depth (NIST
800-160 Vol.1 3.3).
Q004: A developer proposes signing session cookies with HMAC-
SHA256 but wants to use the same 128-bit static key for the next three
years to avoid key-rotation overhead. Which NIST guideline addresses
the appropriate cryptoperiod for this symmetric key?
Options:
A. SP 800-57 Part 1 recommends a maximum cryptoperiod of 1–2 years
for signature applications using symmetric keys
B. SP 800-57 Part 1 allows up to 5 years for any HMAC key under 256
bits


P a g e 3 | 43

, C. FIPS 140-3 mandates that session-signing keys may be reused
indefinitely if stored in a FIPS module
D. OWASP ASVS states that cryptoperiods are optional when HMAC is
used
ANSWER: A
Verified Answer: NIST SP 800-57 Part 1 Table 5-3 limits symmetric
signature keys (e.g., HMAC) to about one year in high-traffic systems,
reinforcing key rotation as a secure design requirement.
Q005: A threat model for an e-commerce platform uses STRIDE. Which
STRIDE category best describes the risk where a customer can change
the price of an item to $0.01 before checkout?
Options:
A. Tampering
B. Information Disclosure
C. Repudiation
D. Elevation of Privilege
ANSWER: D
Verified Answer: Manipulating price data to gain unauthorized
purchasing power is an unauthorized privilege escalation—Elevation of
Privilege in STRIDE (Microsoft Security Development Lifecycle).
Q006: An architect is selecting a cryptographic mode for storing
encrypted backups at rest. The backups are large, but random access to
small segments is required. Which mode provides authenticated
encryption and random access while minimizing re-encryption of
unmodified blocks?


P a g e 4 | 43

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
STUVIAACTUALEXAMS University Of California - Los Angeles (UCLA)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
612
Lid sinds
2 jaar
Aantal volgers
200
Documenten
4286
Laatst verkocht
1 dag geleden
Actual Exam

STUVIAACTUALEXAMS is a trusted exam-success delivering accurate, verified, and exam-focused study materials that include real exam-style questions, correct answers, and clear, easy-to-follow rationales, all professionally organized to save time, eliminate guesswork, reduce stress, boost confidence, and help students secure top grades and pass their exams on the first attempt with certainty and ease.

3,6

79 beoordelingen

5
35
4
11
3
11
2
7
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen