100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D487 SECURE SW DESIGN, QUESTIONS AND ANSWERS $10.99   Add to cart

Exam (elaborations)

D487 SECURE SW DESIGN, QUESTIONS AND ANSWERS

 46 views  1 purchase
  • Course
  • WGU D482
  • Institution
  • WGU D482

D487 SECURE SW DESIGN, QUESTIONS AND ANSWERS

Preview 2 out of 10  pages

  • July 21, 2024
  • 10
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • which
  • WGU D482
  • WGU D482
avatar-seller
Divinehub
D487 SECURE SW DESIGN,
QUESTIONS AND ANSWERS
Which practice in the Ship (A5) phase of the security development cycle verifies whether
the product meets security mandates? - ANSWER-A5 policy compliance analysis
Which post-release support activity defines the process to communicate, identify, and alleviate security threats? - ANSWER-PRSA1: External vulnerability disclosure response
What are two core practice areas of the OWASP Security Assurance Maturity Model (OpenSAMM)? - ANSWER-Governance, Construction
Which practice in the Ship (A5) phase of the security development cycle uses tools to identify weaknesses in the product? - ANSWER-Vulnerability scan
Which post-release support activity should be completed when companies are joining together? - ANSWER-Security architectural reviews
Which of the Ship (A5) deliverables of the security development cycle are performed during the A5 policy compliance analysis? - ANSWER-Analyze activities and standards
Which of the Ship (A5) deliverables of the security development cycle are performed during the code-assisted penetration testing? - ANSWER-white-box security test
Which of the Ship (A5) deliverables of the security development cycle are performed during the open-source licensing review? - ANSWER-license compliance
Which of the Ship (A5) deliverables of the security development cycle are performed during the final security review? - ANSWER-Release and ship
How can you establish your own SDL to build security into a process appropriate for your organization's needs based on agile? - ANSWER-iterative development
How can you establish your own SDL to build security into a process appropriate for your organization's needs based on devops? - ANSWER-continuous integration and continuous deployments
How can you establish your own SDL to build security into a process appropriate for your organization's needs based on cloud? - ANSWER-API invocation processes How can you establish your own SDL to build security into a process appropriate for your organization's needs based on digital enterprise? - ANSWER-enables and improves
business activities
Which phase of penetration testing allows for remediation to be performed? - ANSWER-
Deploy
Which key deliverable occurs during post-release support? - ANSWER-third-party reviews
Which business function of OpenSAMM is associated with governance? - ANSWER-
Policy and compliance
Which business function of OpenSAMM is associated with construction? - ANSWER-
Threat assessment
Which business function of OpenSAMM is associated with verification? - ANSWER-
Code review
Which business function of OpenSAMM is associated with deployment? - ANSWER-
Vulnerability management
What is the product risk profile? - ANSWER-A security assessment deliverable that estimates the actual cost of the product.
A software security team member has been tasked with creating a deliverable that provides details on where and to what degree sensitive customer information is collected, stored, or created within a new product offering. What does the team member need to deliver in order to meet the objective? - ANSWER-Privacy impact assessment
What is the first phase in the security development life cycle? - ANSWER-A1 Security Assessment
What are the three areas of compliance requirements? - ANSWER-Legal, financial, and industry standards
What term refers to how the system should function based on the environment in which the system will operate? - ANSWER-operational requirements
During what phase of SDL do all key stakeholders discuss, identify, and have common understandings of the security and privacy implications, considerations, and requirements? - ANSWER-A1 Security Assessment
What are the three areas of focus in secure software requirements? - ANSWER-
Gathering the software requirements, data classification, and managing data protection requirements

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Divinehub. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99  1x  sold
  • (0)
  Add to cart