Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU Secure Software Design (D487, KEO1) Exam questions and answers 2026 latest update

Beoordeling
-
Verkocht
-
Pagina's
44
Geüpload op
16-04-2026
Geschreven in
2025/2026

WGU Secure Software Design (D487, KEO1) Exam questions and answers 2026 latest update

Instelling
3X@M
Vak
3X@M

Voorbeeld van de inhoud

WGU Secure Software Design (D487,
KEO1) Exam questions and answers 2026
latest update




Module 1: Foundational Security Concepts & Threat Modeling

Q1. What is a study of real-world software security initiatives organized so
companies can measure their initiatives and understand how to evolve them
over time?
A. OWASP Top 10
B. Building Security In Maturity Model (BSIMM)
C. NIST Cybersecurity Framework
D. ISO/IEC 27001

Correct ,,,answer,,,: B
Rationale: BSIMM is a study of real-world software security initiatives that
allows organizations to measure their security practices against industry peers and
understand how to evolve them over time .

Q2. What is the analysis of computer software that is performed without
executing programs?
A. Dynamic analysis
B. Static analysis
C. Fuzzing
D. Penetration testing

,Correct ,,,answer,,,: B
Rationale: Static analysis examines source code or compiled binaries without
executing the program, identifying potential vulnerabilities through code
inspection .

Q3. Which International Organization for Standardization (ISO) standard is
the benchmark for information security today?
A. ISO/IEC 27001
B. ISO/IEC 42001
C. ISO/IEC 9001
D. ISO/IEC 20000

Correct ,,,answer,,,: A
Rationale: ISO/IEC 27001 is the internationally recognized standard for
information security management systems (ISMS), providing requirements for
establishing, implementing, maintaining, and improving security .

Q4. What is the analysis of computer software that is performed by executing
programs on a real or virtual processor in real time?
A. Static analysis
B. Dynamic analysis
C. Code review
D. Design review

Correct ,,,answer,,,: B
Rationale: Dynamic analysis involves executing programs to observe behavior,
identify runtime vulnerabilities, and detect issues that only appear during
execution .

Q5. Which person is responsible for designing, planning, and implementing
secure coding practices and security testing methodologies?
A. Software developer
B. Scrum master

,C. Software security architect
D. Quality assurance analyst

Correct ,,,answer,,,: C
Rationale: The software security architect defines secure coding standards, selects
security testing approaches, and integrates security into the software development
lifecycle .

Q6. Which security principle ensures a system is designed to minimize the
amount of code exposed to attack?
A. Defense in depth
B. Least privilege
C. Attack surface reduction
D. Fail securely

Correct ,,,answer,,,: C
Rationale: Attack surface reduction minimizes exposed components, reducing
potential entry points for attackers. Examples include disabling unused services
and removing unnecessary code .

Q7. What is the primary purpose of threat modeling?
A. To design test cases
B. To identify, classify, and prioritize threats
C. To write secure code
D. To encrypt data

Correct ,,,answer,,,: B
Rationale: Threat modeling is a structured process to identify potential threats,
classify them, and prioritize which risks require mitigation based on business
impact .

Q8. In STRIDE, the "S" (Spoofing) is prevented primarily by:
A. Access control

, B. Input validation
C. Authentication
D. Encryption

Correct ,,,answer,,,: C
Rationale: Spoofing involves an attacker pretending to be someone else. Strong
authentication mechanisms (e.g., passwords, MFA, certificates) prevent identity
spoofing .

Q9. Which STRIDE threat involves unauthorized modification of data?
A. Spoofing
B. Tampering
C. Repudiation
D. Information disclosure

Correct ,,,answer,,,: B
Rationale: Tampering involves unauthorized modification of data, whether at rest,
in transit, or during processing. Integrity controls like hashing and digital
signatures mitigate tampering .

Q10. Which STRIDE threat is mitigated by non-repudiation through digital
signatures?
A. Spoofing
B. Tampering
C. Repudiation
D. Denial of service

Correct ,,,answer,,,: C
Rationale: Repudiation occurs when a user denies performing an action. Digital
signatures provide proof of origin and integrity, preventing repudiation .

Q11. Which DREAD category is based on how easily a threat exploit can be
repeated?

Geschreven voor

Instelling
3X@M
Vak
3X@M

Documentinformatie

Geüpload op
16 april 2026
Aantal pagina's
44
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

$24.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Docwayne5 walden university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
143
Lid sinds
2 jaar
Aantal volgers
27
Documenten
3750
Laatst verkocht
4 uur geleden
TEACH ME TO

I HEIP STUDENTS WITH ALL TYPE OF EXAMZ LIKE NGN,ATI,HESI,PN COMPREHENSION., FIREFIGHTER ,ECONOMICS .ENGLISH,SPANISH.MATHEMATICS .......TO SCORE A+

4.9

713 beoordelingen

5
666
4
20
3
14
2
4
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen