Pass the WGU Courses and Certificates Secure-Software-Design Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.

Which type of security development lifecycle (SDL) tool was likely being used?

Options:

A.

Dynamic analysis


B.

Fuzzing


C.

Threat model


D.

Static analysis


Expert Solution
Questions # 12:

The product security incident response team (PSIRT) has decided to make a formal public disclosure, including base and temporal common vulnerability scoring system (CVSS) scores and a common vulnerabilities and exposures (CVE) ID report, of an externally discovered vulnerability.

What is the most likely reason for making a public disclosure?

Options:

A.

The potential for increased public awareness of a vulnerability is probable, which could lead to higher risk for customers.


B.

The vulnerability reporter has threatened to make the finding public after being notified that their case was not credible.


C.

The response team has determined that the vulnerability is credible.


D.

Notification of a vulnerability from an external party has occurred.


Expert Solution
Questions # 13:

The security team is reviewing whether changes or open issues exist that would affect requirements for handling personal information documented in earlier phases of the development life cycle.

Which activity of the Ship SDL phase is being performed?

Options:

A.

Vulnerability scan


B.

Final security review


C.

Open-source licensing review


D.

Final privacy review


Expert Solution
Questions # 14:

Company leadership has contracted with a security firm to evaluate the vulnerability of all externally lacing enterprise applications via automated and manual system interactions. Which security testing technique is being used?

Options:

A.

Properly-based-testing


B.

Source-code analysis


C.

Penetration testing


D.

Source-code fault injection


Expert Solution
Questions # 15:

What are the eight phases of the software development lifecycle (SDLC)?

Options:

A.

Planning, security analysis, requirement analysis, design, implementation, threat mitigation, testing, maintenance


B.

Planning, requirements, design, implementation, testing, deployment, maintenance, end of life


C.

Plan, gather requirements, identify attack surface, design, write code, perform code reviews, test, deploy


D.

Gather requirements, prototype, perform threat modeling, write code, test, user acceptance testing, deploy, maintain


Expert Solution
Questions # 16:

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

Options:

A.

Attack models


B.

Code review


C.

Architecture analysis


D.

Penetration testing


Expert Solution
Questions # 17:

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

Options:

A.

General coding practices


B.

Input validation


C.

Session management


D.

System configuration


Expert Solution
Questions # 18:

Which step in the change management process includes modifying the source code?

Options:

A.

Patch management


B.

Installation management


C.

Privacy implementation assessment


D.

Policy compliance analysis


Expert Solution
Questions # 19:

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

Options:

A.

Inputs enforce type, format, length, and range checks.


B.

All administrative activities are logged and audited.


C.

Sensitive information is not logged.


D.

All exceptions are handled in a structured way.


Expert Solution
Questions # 20:

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing.

Which post-release deliverable is being described?

Options:

A.

Security Strategy for Legacy Code


B.

Post-Release Certifications


C.

Third-Party Security Review


D.

External Vulnerability Disclosure Response Process


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions