Free Secure-Software-Design Practice Test Questions 2026

72 Questions


Last Updated On : 13-Mar-2026


Which security assessment deliverable identities possible security vulnerabilities in the product?


A. Which security assessment deliverable identities possible security vulnerabilities in the product?


B. SDL project outline


C. Metrics template


D. Threat profile


E. List of third-party software





C.
  Metrics template

A company is moving forward with a new product. Product scope has been determined, teams have formed, and backlogs have been created. Developers areactively writing code for the new product, with one team concentrating on delivering data via REST services, one Team working on the mobile apps, and a third team writing the web application.

Which phase of the software development lifecycle(SDLC) is being described?


A. Deployment


B. Design


C. Implementation


D. Requirements





C.
  Implementation

The software security group is conducting a maturity assessment using the Building Security in Maturity Model (BSIMM). They are currently focused on reviewing attack models created during recently completed initiatives.

Which BSIMM domain is being assessed?


A. Governance


B. Software security development life cycle (SSDL) touchpoints


C. Intelligence


D. Deployment





C.
  Intelligence

What is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or distribution to provide confidentiality, integrity, and availability?


A. Availability


B. Integrity


C. Confidentiality


D. Information Security





D.
  Information Security

Which security assessment deliverable defines measures that can be periodically reported to management?


A. Metrics Template


B. SDL Project Outline


C. Threat Profile


D. Product Risk Profile





A.
  Metrics Template

Which software-testing technique can be automated or semi-automated and provides invalid, unexpected, or random data to the inputs of a computer software program?


A. Fuzzing


B. Static analysis


C. Dynamic analysis


D. Bugtraq





A.
  Fuzzing

Which type of security analysis is performed by injecting malformed data into open interfaces of an executable or running application and is most commonly executed during the testing or deployment phases of the SDLC?


A. Static Analysis


B. Fuzz Testing


C. Dynamic Analysis


D. Manual Code Review





B.
  Fuzz Testing

Which secure coding practice uses role-based authentication where department-specific credentials will authorize department-specific functionality?


A. Access Control


B. Data Protection


C. Input Validation


D. Authentication





A.
  Access Control

Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?


A. Session Management


B. Authentication and Password Management


C. Data Protection


D. General Coding Practices





D.
  General Coding Practices

Which secure coding practice involves clearing all local storage as soon as a user logs of for the night and will automatically log a user out after an hour of inactivity?


A. Access control


B. System configuration


C. Communication security


D. Session management





D.
  Session management

Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?


A. White box testing


B. Reasonableness testing


C. Black box testing


D. Dynamic testing





A.
  White box testing

The Chief Information Security Officer (CISO) has recommended contracting with external experts to perform annual reviews of the enterprise's software products, including penetration testing. Which post-release deliverable is being described?


A. Security Strategy for Legacy Code


B. Post-Release Certifications


C. Third-Party Security Review


D. External Vulnerability Disclosure Response Process





C.
  Third-Party Security Review


Page 2 out of 6 Pages
Next
12
Secure-Software-Design Practice Test Home

What Makes Our WGUSecure Software Design (KEO1) Practice Test So Effective?

Real-World Scenario Mastery: Our Secure-Software-Design practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before WGUSecure Software Design (KEO1) exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive Secure-Software-Design practice exam questions pool covering all topics, the real exam feels like just another practice session.