WGU D487 PRE-ASSESSMENT: SECURE
SOFTWARE DESIGN (KEO1) (PKEO) | 2026
UPDATE WITH COMPLETE SOLUTION
ALREADY GRADED A+
What is a list of information security vulnerabilities that aims to
provide names for publicly known problems? - ANSWERS-Common
computer vulnerabilities and exposures (CVE)
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access? -
ANSWERS-Cryptographic practices
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access? -
ANSWERS-Cryptographic practices
Which secure coding best practice ensures servers, frameworks, and
system components are all running the latest approved versions? -
ANSWERS-System configuration
Which secure coding best practice says to use parameterized queries,
encrypted connection strings stored in separate configuration files,
, and strong passwords or multi-factor authentication? - ANSWERS-
Database security
Which secure coding best practice says that all information passed to
other systems should be encrypted? - ANSWERS-Communication
security
eam members are being introduced during sprint zero in the project
kickoff meeting. The person being introduced is a member of the
scrum team, responsible for writing feature logic and attending sprint
ceremonies. Which role is the team member playing? - ANSWERS-
Software developer
A software security team member has created data flow diagrams,
chosen the STRIDE methodology to perform threat reviews, and
created the security assessment for the new product. Which category
of secure software best practices did the team member perform? -
ANSWERS-Architecture analysis
What is a study of real-world software security initiatives organized so
companies can measure their initiatives and understand how to evolve
them over time?, - ANSWERS-Building Security In Maturity Model
(BSIMM)
What is the analysis of computer software that is performed without
executing programs? - ANSWERS-Static analysis
SOFTWARE DESIGN (KEO1) (PKEO) | 2026
UPDATE WITH COMPLETE SOLUTION
ALREADY GRADED A+
What is a list of information security vulnerabilities that aims to
provide names for publicly known problems? - ANSWERS-Common
computer vulnerabilities and exposures (CVE)
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access? -
ANSWERS-Cryptographic practices
Which secure coding best practice uses well-tested, publicly available
algorithms to hide product data from unauthorized access? -
ANSWERS-Cryptographic practices
Which secure coding best practice ensures servers, frameworks, and
system components are all running the latest approved versions? -
ANSWERS-System configuration
Which secure coding best practice says to use parameterized queries,
encrypted connection strings stored in separate configuration files,
, and strong passwords or multi-factor authentication? - ANSWERS-
Database security
Which secure coding best practice says that all information passed to
other systems should be encrypted? - ANSWERS-Communication
security
eam members are being introduced during sprint zero in the project
kickoff meeting. The person being introduced is a member of the
scrum team, responsible for writing feature logic and attending sprint
ceremonies. Which role is the team member playing? - ANSWERS-
Software developer
A software security team member has created data flow diagrams,
chosen the STRIDE methodology to perform threat reviews, and
created the security assessment for the new product. Which category
of secure software best practices did the team member perform? -
ANSWERS-Architecture analysis
What is a study of real-world software security initiatives organized so
companies can measure their initiatives and understand how to evolve
them over time?, - ANSWERS-Building Security In Maturity Model
(BSIMM)
What is the analysis of computer software that is performed without
executing programs? - ANSWERS-Static analysis