Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D487 Secure Software Design Objective Assessment Practice Exam | Latest 2026 Updated Questions with Verified Answers & Rationales | A+ Study Guide

Beoordeling
-
Verkocht
-
Pagina's
69
Cijfer
A+
Geüpload op
11-02-2026
Geschreven in
2025/2026

Prepare with confidence for the WGU D487 Secure Software Design Objective Assessment using this comprehensive, exam-focused practice resource. Designed for WGU IT and cybersecurity students, this updated study guide reinforces secure design principles, threat modeling, and secure development lifecycle concepts aligned with course competencies. This resource includes scenario-based practice questions with detailed rationales to strengthen understanding of secure software design principles, the principle of least privilege, defense in depth, Secure SDLC (SSDLC), threat modeling methodologies, STRIDE and attack surface analysis, authentication and authorization models, cryptography fundamentals, password hashing and salting, secure coding best practices, OWASP Top 10 vulnerabilities, risk mitigation strategies, secure architecture and system boundaries, and data protection and compliance considerations. Each question is structured to develop analytical thinking and security-first design decision-making, which are key competencies assessed in the WGU D487 objective assessment. This material is ideal for WGU cybersecurity students, WGU software development students, individuals preparing for the Secure Software Design objective assessment, IT security professionals reviewing secure architecture concepts, and learners preparing for competency-based evaluations.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU D487 SECURE SOFTWARE DESIGN EXAM
QUESTIONS AND CORRECT ANSWERS WITH
RATIONALES GRADED A+ LATEST




1. Which of the following best describes the principle of least privilege?
A. Users can access all resources but must authenticate first
B. Applications are granted only the permissions necessary to perform their tasks
C. Developers should have admin access to simplify testing
D. Only privileged users can perform security testing
Correct Answer: B
Rationale: Least privilege limits access rights for users and applications to only
what is strictly necessary to perform their tasks, reducing the attack surface.


2. In a threat model, which step comes first?
A. Identifying mitigations
B. Defining the system and boundaries
C. Running penetration tests
D. Reviewing compliance requirements
Correct Answer: B
Rationale: Threat modeling begins with defining the system, its boundaries, data
flows, and trust levels before identifying threats or mitigations.

,3. A web application stores user passwords using SHA-256 without a salt.
What is the primary risk?
A. Data cannot be decrypted
B. Passwords can be easily reversed using rainbow tables
C. It violates PCI DSS
D. It prevents hashing collisions
Correct Answer: B
Rationale: Unsalted hashes are vulnerable to rainbow table attacks because
identical passwords produce identical hashes, allowing attackers to precompute
common passwords.


4. Which of the following is the most secure method for storing session
identifiers?
A. In local storage
B. In cookies with HttpOnly and Secure flags
C. In a hidden form field
D. In the URL query string
Correct Answer: B
Rationale: Cookies with HttpOnly and Secure flags protect against XSS and
ensure transmission only over HTTPS, making them the most secure option.


5. A developer is designing an API that handles sensitive medical records.
Which security control should be implemented first?
A. Rate limiting
B. Input validation
C. Encryption in transit and at rest
D. Logging
Correct Answer: C
Rationale: Protecting sensitive medical data requires encryption both in transit and
at rest as a foundational control before additional protections.

,6. What is the purpose of a Web Application Firewall (WAF)?
A. Encrypts all application data
B. Detects and blocks malicious HTTP traffic
C. Manages user authentication
D. Automatically patches vulnerabilities
Correct Answer: B
Rationale: A WAF filters, monitors, and blocks HTTP traffic to protect web
applications from attacks like SQL injection and XSS.


7. Which of the following best describes “defense in depth”?
A. Using one strong security control
B. Layering multiple security controls
C. Relying solely on perimeter defenses
D. Encrypting data only at rest
Correct Answer: B
Rationale: Defense in depth uses multiple layers of security controls so if one
fails, others still protect the system.


8. Which type of testing is most appropriate for identifying insecure direct
object references (IDOR)?
A. Static code analysis
B. Dynamic application security testing
C. Manual authorization testing
D. Unit testing
Correct Answer: C
Rationale: Manual authorization testing is the most effective way to detect IDOR
by attempting access to resources without proper permissions.

, 9. Scenario: A company must comply with GDPR. What is the most important
security design concept to include?
A. Data minimization
B. Open-source components
C. Frequent backups
D. Centralized logging
Correct Answer: A
Rationale: GDPR requires minimizing personal data collection and storage. Data
minimization reduces risk and ensures compliance.


10. Which of the following is the best way to prevent SQL injection?
A. Escaping user input
B. Using prepared statements and parameterized queries
C. Disabling database logs
D. Encrypting the database
Correct Answer: B
Rationale: Prepared statements ensure user input is treated as data, not executable
SQL, which prevents SQL injection.


11. What is the primary purpose of input validation?
A. To reduce network latency
B. To ensure user input is safe and expected
C. To encrypt user data
D. To generate session tokens
Correct Answer: B
Rationale: Input validation ensures data conforms to expected format and content,
preventing injection and other attacks.

Geschreven voor

Vak

Documentinformatie

Geüpload op
11 februari 2026
Aantal pagina's
69
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
PrimeStudySolutions
2.0
(1)

Maak kennis met de verkoper

Seller avatar
PrimeStudySolutions chamberlain College of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
8
Lid sinds
5 maanden
Aantal volgers
2
Documenten
1501
Laatst verkocht
1 maand geleden
PrimeStudySolutions

I provide high-quality, verified solutions across a wide range of subjects, including Nursing, Business, Accounting, Statistics, Chemistry, Biology, Psychology, Education, and many more academic areas. I specialize in delivering A+-level study guides, accurate solutions, detailed explanations, and real exam-style materials designed to help learners study efficiently and perform with confidence. Professionalism, clarity, and student success are my priorities. If any resource does not meet your expectations, I am always open to resolving the issue — your satisfaction is guaranteed. Reliable content, friendly support, and trusted accuracy. Your success comes first.

Lees meer Lees minder
2.0

1 beoordelingen

5
0
4
0
3
0
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen