Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free WGU Secure-Software-Design Practice Exam with Questions & Answers

Questions 1

In which step of the PASTA threat modeling methodology is vulnerability and exploit analysis performed?

Options:
A.

Define technical scope

B.

Attack modeling

C.

Define objectives

D.

Application decomposition

WGU Secure-Software-Design Premium Access
Questions 2

The security team is reviewing all noncommercial software libraries used in the new product to ensure they are being used according to the legal specifications defined by the authors.

What activity of the Ship SDL phase is being performed?

Options:
A.

Policy compliance analysis

B.

Open-source licensing review

C.

Penetration testing

D.

Final security review

Questions 3

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?

Options:
A.

White box testing

B.

Reasonableness testing

C.

Black box testing

D.

Dynamic testing

Questions 4

Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?

Options:
A.

Dynamic Analysis

B.

Static Analysis

C.

Manual Code Review

D.

Fuzz Testing

Questions 5

The security team has a library of recorded presentations that are required viewing tor all new developers in the organization. The video series details organizational security policies and demonstrates how to define, test for. and code tor possible threats.

Which category of secure software best practices does this represent?

Options:
A.

Attack models

B.

Training

C.

Architecture analysis

D.

Code review

Questions 6

Which secure coding best practice says to ensure that buffers are allocated correctly and at the right size, that input strings are truncated to a reasonable length, and that resources, connections, objects, and file handles are destroyed once the application no longer needs them?

Options:
A.

Input Validation

B.

Memory Management

C.

Session Management

D.

Data Protection

Questions 7

The security team has received notice of an insecure direct object reference vulnerability in a third-party component library that could result in remote code execution. The component library was replaced and is no longer being used within the application.

How should the organization remediate this vulnerability?

Options:
A.

Ensure Sensitive Information Is Not Logged

B.

Ensure Auditing and Logging Is Enabled on All Servers

C.

Access to Configuration Files Is Limited to Administrators

D.

Enforce the Removal of Unused Dependencies

Questions 8

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:
A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

Questions 9

During fuzz testing of the new product, random values were entered into input elements Search requests were sent to the correct API endpoint but many of them failed on execution due to type mismatches.

How should existing security controls be adjusted to prevent this in the future?

Options:
A.

Ensure all user input data is validated prior to transmitting requests

B.

Ensure all requests and responses are encrypted

C.

Ensure sensitive transactions can be traced through an audit log

D.

Ensure the contents of authentication cookies are encrypted

Questions 10

Features have been developed and fully tested, the production environment has been created, and leadership has approved the release of the new product. Technicians have scheduled a time and date to make the product available to customers.

Which phase of the software development lifecycle (SDLC) is being described?

Options:
A.

Maintenance

B.

Deployment

C.

End of life

D.

Testing

Certification Provider: WGU
Exam Name: WGU Secure Software Design (D487) Exam
Last Update: Jul 15, 2025
Questions: 113

WGU Related Exams

How to pass WGU Managing-Human-Capital - WGU Managing Human Capital C202 Exam
How to pass WGU Integrated-Physical-Sciences - WGU Integrated Physical Sciences (MTC1) Exam
How to pass WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (D488) Exam
How to pass WGU Organizational-Behaviors-and-Leadership - WGU Organizational Behaviors and Leadership (IBC1) Exam
How to pass WGU Principles-of-Management - Principles of Management at Western Governors University(IAC1) Exam
How to pass WGU Web-Development-Applications - WGU Web Development Applications (KVO1) Exam
How to pass WGU Ethics-In-Technology - WGU Ethics In TechnologyQCO1 Exam
How to pass WGU Information-Technology-Management - WGU Information Technology Management QGC1 Exam
How to pass WGU Network-and-Security-Foundation - Network-and-Security-Foundation Exam
How to pass WGU Data-Management-Foundations - WGU Data Management – Foundations Exam Exam
How to pass WGU Cloud-Deployment-and-Operations - WGUCloud Deployment and Operations Exam

WGU Free Exams

WGU Free Exams
Examstrack offers comprehensive free resources and practice tests for WGU exams.