Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

GitHub-Advanced-Security Questions and Answers

Question # 6

Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)

A.

In a third-party Git repository

B.

In a workflow

C.

In an external continuous integration (CI) system

D.

In the Files changed tab of the pull request

Full Access
Question # 7

Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:

A.

Public repositories

B.

All new repositories within your organization

C.

User-owned private repositories

D.

Private repositories

Full Access
Question # 8

Which patterns are secret scanning validity checks available to?

A.

High entropy strings

B.

Custom patterns

C.

Partner patterns

D.

Push protection patterns

Full Access
Question # 9

When using CodeQL, what extension stores query suite definitions?

A.

.yml

B.

.ql

C.

.qll

D.

.qls

Full Access
Question # 10

When does Dependabot alert you of a vulnerability in your software development process?

A.

When a pull request adding a vulnerable dependency is opened

B.

As soon as a vulnerable dependency is detected

C.

As soon as a pull request is opened by a contributor

D.

When Dependabot opens a pull request to update a vulnerable dependency

Full Access
Question # 11

Which key is required in the update settings of the Dependabot configuration file?

A.

rebase-strategy

B.

commit-message

C.

assignees

D.

package-ecosystem

Full Access
Question # 12

Which of the following is the best way to prevent developers from adding secrets to the repository?

A.

Create a CODEOWNERS file

B.

Make the repository public

C.

Configure a security manager

D.

Enable push protection

Full Access
Question # 13

As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?

A.

Write

B.

None

C.

Admin

D.

Read

Full Access
Question # 14

When using CodeQL, how does extraction for compiled languages work?

A.

By generating one language at a time

B.

By resolving dependencies to give an accurate representation of the codebase

C.

By monitoring the normal build process

D.

By running directly on the source code

Full Access
Question # 15

A secret scanning alert should be closed as "used in tests" when a secret is:

A.

In the readme.md file.

B.

In a test file.

C.

Solely used for tests.

D.

Not a secret in the production environment.

Full Access
Question # 16

Where can you find a deleted line of code that contained a secret value?

A.

Insights

B.

Issues

C.

Commits

D.

Dependency graph

Full Access
Question # 17

What YAML syntax do you use to exclude certain files from secret scanning?

A.

decrypt_secret.sh

B.

paths-ignore:

C.

branches-ignore:

D.

secret scanning.yml

Full Access
Question # 18

Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)​

A.

It generates a Dependabot alert and displays it on the Security tab for the repository.

B.

It notifies the repository administrators about the new alert.

C.

It generates Dependabot alerts by default for all private repositories.

D.

It consults with a security service and conducts a thorough vulnerability review.​

Full Access
Question # 19

Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)

A.

directory

B.

package-ecosystem

C.

milestone

D.

schedule.interval

E.

allow

Full Access
Question # 20

Secret scanning will scan:​

A.

A continuous integration system.

B.

Any Git repository.

C.

The GitHub repository.

D.

External services.​

Full Access
Question # 21

What is a security policy?

A.

An automatic detection of security vulnerabilities and coding errors in new or modified code

B.

A security alert issued to a community in response to a vulnerability

C.

A file in a GitHub repository that provides instructions to users about how to report a security vulnerability

D.

An alert about dependencies that are known to contain security vulnerabilities

Full Access
Question # 22

A dependency has a known vulnerability. What does the warning message include?

A.

The security impact of these changes

B.

An easily understandable visualization of dependency change

C.

How many projects use these components

D.

A brief description of the vulnerability

Full Access