Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D487 SECURE SOFTWARE DESIGN EXAM QUESTIONS AND CORRECT ANSWERS WITH RATIONALES GRADED A+ LATEST

Beoordeling
-
Verkocht
-
Pagina's
69
Cijfer
A+
Geüpload op
26-01-2026
Geschreven in
2025/2026

WGU D487 SECURE SOFTWARE DESIGN EXAM QUESTIONS AND CORRECT ANSWERS WITH RATIONALES GRADED A+ LATEST

Instelling
WGU D487 SECURE SW DESIGN
Vak
WGU D487 SECURE SW DESIGN

Voorbeeld van de inhoud

WGU D487 SECURE SOFTWARE DESIGN EXAM
QUESTIONS AND CORRECT ANSWERS WITH
RATIONALES GRADED A+ LATEST




1. Which of the following best describes the principle of least privilege?
A. Users can access all resources but must authenticate first
B. Applications are granted only the permissions necessary to perform their tasks
C. Developers should have admin access to simplify testing
D. Only privileged users can perform security testing
Correct Answer: B
Rationale: Least privilege limits access rights for users and applications to only
what is strictly necessary to perform their tasks, reducing the attack surface.


2. In a threat model, which step comes first?
A. Identifying mitigations
B. Defining the system and boundaries
C. Running penetration tests
D. Reviewing compliance requirements
Correct Answer: B
Rationale: Threat modeling begins with defining the system, its boundaries, data
flows, and trust levels before identifying threats or mitigations.

,3. A web application stores user passwords using SHA-256 without a salt.
What is the primary risk?
A. Data cannot be decrypted
B. Passwords can be easily reversed using rainbow tables
C. It violates PCI DSS
D. It prevents hashing collisions
Correct Answer: B
Rationale: Unsalted hashes are vulnerable to rainbow table attacks because
identical passwords produce identical hashes, allowing attackers to precompute
common passwords.


4. Which of the following is the most secure method for storing session
identifiers?
A. In local storage
B. In cookies with HttpOnly and Secure flags
C. In a hidden form field
D. In the URL query string
Correct Answer: B
Rationale: Cookies with HttpOnly and Secure flags protect against XSS and
ensure transmission only over HTTPS, making them the most secure option.


5. A developer is designing an API that handles sensitive medical records.
Which security control should be implemented first?
A. Rate limiting
B. Input validation
C. Encryption in transit and at rest
D. Logging
Correct Answer: C
Rationale: Protecting sensitive medical data requires encryption both in transit and
at rest as a foundational control before additional protections.

,6. What is the purpose of a Web Application Firewall (WAF)?
A. Encrypts all application data
B. Detects and blocks malicious HTTP traffic
C. Manages user authentication
D. Automatically patches vulnerabilities
Correct Answer: B
Rationale: A WAF filters, monitors, and blocks HTTP traffic to protect web
applications from attacks like SQL injection and XSS.


7. Which of the following best describes “defense in depth”?
A. Using one strong security control
B. Layering multiple security controls
C. Relying solely on perimeter defenses
D. Encrypting data only at rest
Correct Answer: B
Rationale: Defense in depth uses multiple layers of security controls so if one
fails, others still protect the system.


8. Which type of testing is most appropriate for identifying insecure direct
object references (IDOR)?
A. Static code analysis
B. Dynamic application security testing
C. Manual authorization testing
D. Unit testing
Correct Answer: C
Rationale: Manual authorization testing is the most effective way to detect IDOR
by attempting access to resources without proper permissions.

, 9. Scenario: A company must comply with GDPR. What is the most important
security design concept to include?
A. Data minimization
B. Open-source components
C. Frequent backups
D. Centralized logging
Correct Answer: A
Rationale: GDPR requires minimizing personal data collection and storage. Data
minimization reduces risk and ensures compliance.


10. Which of the following is the best way to prevent SQL injection?
A. Escaping user input
B. Using prepared statements and parameterized queries
C. Disabling database logs
D. Encrypting the database
Correct Answer: B
Rationale: Prepared statements ensure user input is treated as data, not executable
SQL, which prevents SQL injection.


11. What is the primary purpose of input validation?
A. To reduce network latency
B. To ensure user input is safe and expected
C. To encrypt user data
D. To generate session tokens
Correct Answer: B
Rationale: Input validation ensures data conforms to expected format and content,
preventing injection and other attacks.

Geschreven voor

Instelling
WGU D487 SECURE SW DESIGN
Vak
WGU D487 SECURE SW DESIGN

Documentinformatie

Geüpload op
26 januari 2026
Aantal pagina's
69
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$30.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
johnkibathi28 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
112
Lid sinds
2 jaar
Aantal volgers
17
Documenten
973
Laatst verkocht
1 week geleden
Best Studyguide Resources

Welcome to Best Studyguide Resources – your trusted source for accurate, reliable, and up-to-date study materials. As a certified tutor, I understand how important the right resources are for exam preparation and academic success. That’s why every guide, test bank, and study package in this shop is carefully curated, professionally organized, and designed to help you succeed. I am committed to delivering only top-tier documents to ensure the best outcomes for your academic success. Gain instant access to expertly curated materials designed to help you excel in your studies and certifications. Take the next step toward achieving your academic and professional goals Feedback is always welcome. I encourage all clients to leave a review after purchase—whether positive or constructive—to help me improve and continue offering the best possible support.

Lees meer Lees minder
3.8

17 beoordelingen

5
10
4
2
3
0
2
1
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen