WGU MASTER'S COURSE C706 -SECURE
SOFTWARE DESIGN EXAM LATEST 2024
WITH UPDATED QUESTIONS AND
DETAILEDCORRECT ANSWERS WITH
RATIONALES
(ALREADY GRADED A+)
Which security concept refers to the quality of information that
could cause harm or damage if disclosed?
-Isolation
-Discretion
-Seclusion
-Sensitivity - ANSWER-Sensitivity
Which technology would be an example of an injection flaw,
according to the OWASP Top 10?
-SQL
-API
-XML
-XSS - ANSWERA company is creating a new software to track customer balance
and wants to design a secure application.
Which best practice should be applied?
-Create multiple layers of protection so that a subsequent layer
provides protection if a layer is breached
-Ensure there is physical acceptability to ensure software is
intuitive for the users to do their jobs
2 | P a g e
-Allow mediation bypass or suspension for software testing and
emergency planning
-Develop a secure authentication method that has a closed
design - ANSWER-Create multiple layers of protection so that a
subsequent layer provides protection if a layer is breached
A company is developing a secure software that has to be
evaluated and tested by a large number of experts.
Which security principle should be applied?
-Fail safe
-Open design
-Defense in depth
-Complete mediation - ANSWER-Open design
Which type of TCP scanning indicates that a system is moving to
the second phase in a three-way TCP handshake?
-TCP SYN scanning
-TCP ACK scanning
-TCP XMAS scanning
-TCP Connect scanning - ANSWER-TCP SYN scanning
Which evaluation technique provides invalid, unexpected, or
random data to the inputs of a computer software program?
-Fuzz testing
-Static analysis
-Dynamic analysis
-Regression testing - ANSWER--Fuzz testing
Which approach provides an opportunity to improve the software
development life cycle by tailoring the process to the specific risks
facing the organization?
-Agile methodology
-Waterfall methodology
-Building security in maturity model (BSIMM)
3 | P a g e
-Software assurance maturity model (SAMM) - ANSWERSoftware assurance maturity model (SAMM)
Which due diligence activity for supply chain security should occur
in the initiation phase of the software acquisition life cycle?
-Facilitating knowledge transfer between suppliers
-Lessening the risk of disseminating information during disposal
-Mitigating supply chain security risk by providing user guidance
-Developing a request for proposal (RFP) that includes supply
chain security risk management - ANSWER--Developing a
request for proposal (RFP) that includes supply chain security risk
management
Which due diligence activity for supply chain security investigates
the means by which data sets are shared and assessed?
-An on-site assessment
-A process policy review
-A third-party assessment
-A document exchange and review - ANSWER-A document
exchange and review
Consider these characteristics:
Identification of the entity making the access request
Verification that the request has not changed since its initiation
Application of the appropriate authorization procedures
Reexamination of previously authorized requests by the same
entity
Download alle 44 pagina's voor € 32,99
Document in winkelwagen
PREMIUM TUTORING AND HOMEWORK ASSISTANCE GUARANTEED (A+) GRADE RESULTS FOR QUIZZES AND EXAMS.
As an expert tutor on KNOOWY, I specialize in psychology, nursing and human resource management. My top priority is assisting students with high-quality, scholarly work that meets academic standards. I guarantee good grades by providing meticulously crafted and well-researched documents. Whether you need help with homework, tutoring, quizzes, or exams, you can rely on my expertise and dedication to achieve outstanding results.
ati ati comprehensive predictor ati pharmacology proctored community health comprehensive fundamentals health care health care / nursing health care/ nursing healthcare hesi hesi rn exit leadership maternal newborn med surg medical surgical mental health nurs nursing nursing & health nutrition pediatrics pharmacology test bank tncc
Het is heel fijn om via Knoowy extra ondersteuning te hebben bij het studeren door middel van samenvattingen van de lesstof.
Een goede keuze voor samenvattingen. Je bespaart tijd en energie.
Knoowy heeft mij geholpen om aan samenvattingen te komen, zodat ik tijd bespaar door het zelf niet te hoeven maken.
Prima database om studiemateriaal uit te halen, goed toegankelijk, eenvoudig zoeken.
Knoowy werkt heel goed. Ik kon de inhoud direct downloaden na betaling.
Jullie website is top! Het heeft me al veel geholpen. Zeker omdat ik thuis studeer!
Betrouwbaar platform om kwaliteitsvolle samenvattingen te vinden en een aangename en gemakkelijke website om te gebruiken
Een handige site voor het aankopen van samenvattingen voor examens.