Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 4
Total 35 questions
Exam Code: Secure-Software-Design                Update: Oct 3, 2025
Exam Name: WGU Secure Software Design (D487, KEO1) Exam

WGU WGU Secure Software Design (D487, KEO1) Exam Secure-Software-Design Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

A security architect is creating a data flow diagram and draws an arrow between two circles.

What does the arrow represent?

A.

Data Store

B.

External Entity

C.

Process

D.

Data Flow

Question # 2

Developers have finished coding, and changes have been peer-reviewed. Features have been deployed to a pre-production environment so that analysts may verify that the product is working as expected.

Which phase of the Software Development Life Cycle (SDLC) is being described?

A.

Requirements

B.

Design

C.

Testing

D.

Deployment

Question # 3

Which security assessment deliverable defines measures that can be periodically reported to management?

A.

Metrics Template

B.

SDL Project Outline

C.

Threat Profile

D.

Product Risk Profile

Question # 4

The final security review determined that two low-risk security issues identified in testing are still outstanding. Developers have assured the security team that both issues can be resolved quickly once they have time to fix them. The security team is confident that developers can fix the flaws in the first post-release patch.

What is the result of the final security review?

A.

Not Passed but Does Not Require Escalation

B.

Not Passed and Requires Escalation

C.

Passed with Exceptions

D.

Passed

Question # 5

Using a web-based common vulnerability scoring system (CVSS) calculator, a security response team member performed an assessment on a reported vulnerability in the company's customer portal. The base score of the vulnerability was 9.9 and changed to 8.0 after adjusting temporal and environmental metrics.

Which rating would CVSS assign this vulnerability?

A.

Medium severity

B.

Critical severity

C.

Low severity

D.

High severity

Question # 6

What is a best practice of secure coding?

A.

Planning

B.

Session management

C.

User acceptance testing

D.

Microservices

Question # 7

The security team contracts with an independent security consulting firm to simulate attacks on deployed products and report results to organizational leadership.

Which category of secure software best practices is the team performing?

A.

Attack models

B.

Code review

C.

Architecture analysis

D.

Penetration testing

Question # 8

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?

A.

Governance

B.

Software security development life cycle (SSDL) touchpoints

C.

Intelligence

D.

Deployment

Question # 9

Which threat modeling step collects exploitable weaknesses within the product?

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope

Question # 10

A legacy application has been replaced by a new product that provides mobile capabilities to the company's customer base. The two products have run concurrently for the last three months to provide a fallback if the new product experienced a large-scale failure. The time has come to turn off access to the legacy application.

Which phase of the Software Development Life Cycle (SDLC) is being described?

A.

End of Life

B.

Design

C.

Maintenance

D.

Planning

Page: 1 / 4
Total 35 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 03 Oct 2025