Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

GH-500 Questions and Answers

Question # 6

Which security feature shows a vulnerable dependency in a pull request?

A.

Dependency graph

B.

Dependency review

C.

Dependabot alert

D.

The repository's Security tab

Full Access
Question # 7

When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)

A.

Packs

B.

github/codeql

C.

Scope

D.

Queries

Full Access
Question # 8

Which of the following benefits do code scanning, secret scanning, and dependency review provide?

A.

Search for potential security vulnerabilities, detect secrets, and show the full impact of changes to dependencies

B.

Confidentially report security vulnerabilities and privately discuss and fix security vulnerabilities in your repository's code

C.

View alerts about dependencies that are known to contain security vulnerabilities

D.

Automatically raise pull requests, which reduces your exposure to older versions of dependencies

Full Access
Question # 9

When using the advanced CodeQL code scanning setup, what is the name of the workflow file?​

A.

codeql-config.yml

B.

codeql-scan.yml

C.

codeql-workflow.yml

D.

codeql-analysis.yml

Full Access
Question # 10

Which details do you have to provide to create a custom pattern for secret scanning? (Each answer presents part of the solution. Choose two.)

A.

The secret format

B.

The name of the pattern

C.

A list of repositories to scan

D.

Additional match requirements for the secret format

Full Access
Question # 11

A dependency has a known vulnerability. What does the warning message include?

A.

The security impact of these changes

B.

An easily understandable visualization of dependency change

C.

How many projects use these components

D.

A brief description of the vulnerability

Full Access
Question # 12

Which of the following Watch settings could you use to get Dependabot alert notifications? (Each answer presents part of the solution. Choose two.)

A.

The Custom setting

B.

The Participating and @mentions setting

C.

The All Activity setting

D.

The Ignore setting

Full Access
Question # 13

Which of the following tasks can be performed by a security team as a proactive measure to help address secret scanning alerts? (Each answer presents a complete solution. Choose two.)

A.

Dismiss alerts that are older than 90 days.

B.

Configure a webhook to monitor for secret scanning alert events.

C.

Enable system for cross-domain identity management (SCIM) provisioning for the enterprise.

D.

Document alternatives to storing secrets in the source code.

Full Access
Question # 14

What role is required to change a repository's code scanning severity threshold that fails a pull request status check?

A.

Maintain

B.

Write

C.

Triage

D.

Admin

Full Access
Question # 15

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

A.

Dependabot reviews manifest files in the repository

B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies

C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisory database

D.

The build tool finds the vulnerable dependencies and calls the Dependabot API

Full Access
Question # 16

You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?​

A.

Show paths

B.

Security

C.

Code scanning alerts​

Full Access
Question # 17

The autobuild step in the CodeQL workflow has failed. What should you do?

A.

Remove specific build steps.

B.

Compile the source code.

C.

Remove the autobuild step from your code scanning workflow and add specific build steps.

D.

Use CodeQL, which implicitly detects the supported languages in your code base.

Full Access
Question # 18

A secret scanning alert should be closed as "used in tests" when a secret is:

A.

In the readme.md file.

B.

In a test file.

C.

Solely used for tests.

D.

Not a secret in the production environment.

Full Access
Question # 19

What should you do after receiving an alert about a dependency added in a pull request?

A.

Disable Dependabot alerts for all repositories owned by your organization

B.

Fork the branch and deploy the new fork

C.

Update the vulnerable dependencies before the branch is merged

D.

Deploy the code to your default branch

Full Access
Question # 20

As a repository owner, you want to receive specific notifications, including security alerts, for an individual repository. Which repository notification setting should you use?

A.

Ignore

B.

Participating and @mentions

C.

All Activity

D.

Custom

Full Access
Question # 21

When using CodeQL, how does extraction for compiled languages work?

A.

By generating one language at a time

B.

By resolving dependencies to give an accurate representation of the codebase

C.

By monitoring the normal build process

D.

By running directly on the source code

Full Access
Question # 22

What does code scanning do?

A.

It contacts maintainers to ask them to create security advisories if a vulnerability is found

B.

It prevents code pushes with vulnerabilities as a pre-receive hook

C.

It analyzes a GitHub repository to find security vulnerabilities

D.

It scans your entire Git history on branches present in your GitHub repository for any secrets

Full Access