New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU (D487, KEO1) Secure Software Design Exam - Topic 6 Question 2 Discussion

Actual exam question for WGU's WGU (D487, KEO1) Secure Software Design exam
Question #: 2
Topic #: 6
[All WGU (D487, KEO1) Secure Software Design Questions]

Which secure software design principle assumes attackers have the source code and specifications of the product?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Miles
14 hours ago
Totally agree, Open Design is key!
upvoted 0 times
...
Delpha
6 days ago
It's definitely A) Open Design.
upvoted 0 times
...
Jamey
11 days ago
Open Design, huh? I guess that makes sense if the bad guys know all your secrets already.
upvoted 0 times
...
Georgene
16 days ago
B) Psychological Acceptability? Really? That's not even close to the right principle here.
upvoted 0 times
...
Davida
21 days ago
I'm going with C) Total Mediation. Sounds like it could be the right answer.
upvoted 0 times
...
Shenika
26 days ago
D) Separation of Privileges is a good security principle, but it doesn't assume the attacker has the source code.
upvoted 0 times
...
Shaun
1 month ago
A) Open Design is the correct answer. Attackers having the source code is a key assumption of this principle.
upvoted 0 times
...
Cheryl
1 month ago
I feel like I’ve seen a question like this before, but I can't recall if it was about Open Design or something else.
upvoted 0 times
...
Cassi
1 month ago
I remember studying about secure design principles, and Open Design definitely sounds familiar. It’s about transparency, right?
upvoted 0 times
...
Chaya
2 months ago
I think the principle that assumes attackers have access to the source code is Open Design, but I'm not entirely sure.
upvoted 0 times
...
Leeann
2 months ago
Okay, I'm going to go with C) Total Mediation. That principle ensures all access to resources is checked, even if the attacker has the source code.
upvoted 0 times
...
Beula
2 months ago
You know, I think I remember learning about this in class. Let me think it through carefully before answering.
upvoted 0 times
...
Jamal
2 months ago
I think it's A) Open Design. Makes sense to assume attackers know the code.
upvoted 0 times
...
Carmen
2 months ago
Wait, I'm not sure about that. Isn't Separation of Privileges also based on the assumption that the attacker has access to the system?
upvoted 0 times
...
Ena
3 months ago
I thought Total Mediation was related to access control, but now I'm questioning if it could be the answer here.
upvoted 0 times
...
Rolland
3 months ago
Hmm, I'm stumped. Guess I'll have to go with my gut and choose A) Open Design.
upvoted 0 times
...
Paz
3 months ago
I'm pretty sure it's A) Open Design. That principle assumes the attacker has full knowledge of the system.
upvoted 0 times
...
Evangelina
3 months ago
Hmm, this one seems tricky. I think the key is to focus on the "assume attackers have the source code" part of the question.
upvoted 0 times
Jess
2 months ago
I think it’s definitely A) Open Design.
upvoted 0 times
...
...

Save Cancel