Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

A new product does not display personally identifiable information, will not let private documents be printed, and requires elevation of privilege to retrieve archive documents. Which secure coding practice is this describing?

Options:

A.

Access control


B.

Data protection


C.

Input validation


D.

Authentication


Expert Solution
Questions # 2:

Which mitigation technique can be used to fight against a denial of service threat?

Options:

A.

Digital signatures


B.

Protect secrets


C.

Timestamps


D.

Throttling


Expert Solution
Questions # 3:

Which threat modeling methodology involves creating or using collections of similar threats?

Options:

A.

Data Flow Diagrams


B.

Attack Libraries


C.

Attack Trees


D.

Security Profile


Expert Solution
Questions # 4:

After being notified of a vulnerability in the company’s online payment system, the Product Security Incident Response Team (PSIRT) was unable to recreate the vulnerability in a testing lab.

What is the response team’s next step?

Options:

A.

Determine the Severity of the Vulnerability


B.

Notify the Reporter That the Case Is Going to Be Closed


C.

Determine How the Reporter Was Able to Create the Vulnerability


D.

Identify Resources and Schedule the Fix


Expert Solution
Questions # 5:

Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.

How should the organization remediate this vulnerability?

Options:

A.

Ensure servers are configured to return as little information as possible to network requests


B.

Ensure servers are regularly updated with the latest security patches


C.

Always uninstall or disable features that are not required


D.

Access to configuration files is limited to administrators


Expert Solution
Questions # 6:

Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?

Options:

A.

Fuzz testing


B.

Dynamic code analysis


C.

Manual code review


D.

Static code analysis


Expert Solution
Questions # 7:

The scrum team decided that before any change can be merged and tested, it must be looked at by the learns lead developer, who will ensure accepted coding patterns are being followed and that the code meets the team's quality standards.

Which category of secure software best practices is the team performing?

Options:

A.

Architecture analysis


B.

Penetration testing


C.

Code review


D.

Training


Expert Solution
Questions # 8:

Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?

Options:

A.

Output Encoding


B.

Input Validation


C.

Access Control


D.

Session Management


Expert Solution
Questions # 9:

The organization has contracted with an outside firm to simulate an attack on the new software product and report findings and remediation recommendations.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Penetration testing


B.

Policy compliance analysis


C.

Open-source licensing review


D.

Final security review


Expert Solution
Questions # 10:

The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP OpenSAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.

Which OpenSAMM business function is being assessed?

Options:

A.

Construction


B.

Deployment


C.

Verification


D.

Governance


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions