Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Secure Software Design (D487, KEO1) Exam questions and answers 2026 latest update

Rating
-
Sold
-
Pages
60
Grade
A+
Uploaded on
16-04-2026
Written in
2025/2026

WGU Secure Software Design (D487, KEO1) Exam questions and answers 2026 latest update

Institution
WGU Secure Software Design
Course
WGU Secure Software Design

Content preview

WGU Secure Software Design (D487, KEO1)
Exam questions and answers 2026 latest
update

Question 1
While performing functional testing of a new product from a shared machine, a
QA analyst closed their browser window but did not log out of the application. A
different QA analyst accessed the application an hour later and was not prompted
to log in. They then noticed the previous analyst was still logged into the
application. How should existing security controls be adjusted to prevent this in the
future?
• A. Ensure no sensitive information is stored in plain text in cookies
• B. Ensure user sessions timeout after short intervals
• C. Ensure role-based access control is enforced for access to all resources
• D. Ensure strong password policies are enforced
Correct Answer:-B
Rationale: The issue is an active session remaining after browser closure.
Implementing session timeouts (inactivity and absolute) ensures sessions expire
automatically, preventing unauthorized access from shared machines.


Question 2
Which secure coding practice helps prevent attackers from injecting malicious
SQL statements into application input fields?
• A. Input Validation
• B. Memory Management
• C. Session Management
• D. Data Protection

,Correct Answer:-A
Rationale: Input validation ensures user inputs meet expected formats, preventing
SQL injection. Parameterized queries and stored procedures are key techniques.
Reference: OWASP SQL Injection Prevention Cheat Sheet.


Question 3
A product team (Scrum Master, Business Analyst, two Developers, QA Tester, and
Product Owner) is reviewing a list of work items to determine how many they can
complete within the next two-week iteration. Which Scrum ceremony is the team
participating in?
• A. Daily Scrum
• B. Sprint Planning
• C. Sprint Retrospective
• D. Sprint Review
Correct Answer:-B
Rationale: Sprint Planning determines the work to be done in the upcoming sprint.
The team selects items from the product backlog and defines the sprint goal.


Question 4
What is a countermeasure to the web application security frame (ASF) data
validation/parameter validation threat category?
• A. Inputs enforce type, format, length, and range checks
• B. All administrative activities are logged and audited
• C. Sensitive information is not logged
• D. All exceptions are handled in a structured way
Correct Answer:-A

,Rationale: Data validation/parameter validation threats are mitigated by enforcing
strict checks on input type, format, length, and range, preventing injection and
malformed data attacks.


Question 5
Which secure coding best practice ensures that buffers are allocated correctly and
at the right size, that input strings are truncated to a reasonable length, and that
resources, connections, objects, and file handles are destroyed once the application
no longer needs them?
• A. Input Validation
• B. Memory Management
• C. Session Management
• D. Data Protection
Correct Answer:-B
Rationale: Memory management includes proper buffer allocation, string
truncation, and deallocation of resources to prevent buffer overflows and memory
leaks.


Question 6
Which software development model starts by specifying and implementing just a
part of the software, which is then reviewed and identifies further requirements that
are implemented by repeating the cycle?
• A. Iterative
• B. Implementation
• C. Waterfall
• D. Code and fix
Correct Answer:-A

, Rationale: The iterative model involves repeated cycles (iterations) where each
iteration adds functionality based on feedback. Contrast with Waterfall (linear) and
Code-and-fix (ad hoc).


Question 7
A developer writes code that uses a variable to directly concatenate user input into
a SQL query string. What is the primary vulnerability being introduced?
• A. Cross-Site Scripting (XSS)
• B. SQL Injection
• C. Command Injection
• D. LDAP Injection
Correct Answer:-B
Rationale: Direct concatenation of user input into SQL queries allows attackers to
modify the query structure, leading to SQL injection. Use parameterized queries
instead.


Question 8
An application allows users to upload profile pictures. An attacker uploads a file
named malicious.php but changes the Content-Type header to image/jpeg. The
server accepts the file and stores it in a web-accessible directory. What security
control is missing?
• A. Input validation on file name length
• B. File type validation based on content (not just MIME type)
• C. Anti-virus scanning
• D. Logging of upload attempts
Correct Answer:-B
Rationale: Relying on client-supplied MIME types is insecure. Proper file
validation should inspect file magic bytes or use secure libraries to verify actual
content type.

Written for

Institution
WGU Secure Software Design
Course
WGU Secure Software Design

Document information

Uploaded on
April 16, 2026
Number of pages
60
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$25.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Drlima Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
26
Member since
1 year
Number of followers
0
Documents
1269
Last sold
5 days ago
Drlima

Hi! ,I'mDrlima , a certified TeachMe2 Totur with over 5 helping University and college students succeed. I am a Verified Nursing Tutor specializing in Ihuman Case Studies, Advanced pharmacology (NR565), HESI, TEAS 7, Pediatrics and More, creating HIGH QUALITY,EXAM FOCUSED STUDY GUIDES. Every document is crafted to be clear, accurate, and easy understanding saving you study time and improving your grades. Whatever you are preparing for Hesi A2, NCLEX or University coursework ,my notes are trusted by hundreds of students like you. ✅ Backed by toturing experience. ✅ Organized by topic and exam need. ✅ Instant access and affordable pricing. Let's help you pass smarter ,not harder. Browse my store now !

Read more Read less
1.3

3 reviews

5
0
4
0
3
0
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions