Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

GH-500 Questions and Answers

Question # 6

Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?

A.

Non-provider patterns

B.

Push protection

C.

Custom pattern dry runs

D.

Secret validation

Full Access
Question # 7

Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)

A.

In a third-party Git repository

B.

In a workflow

C.

In an external continuous integration (CI) system

D.

In the Files changed tab of the pull request

Full Access
Question # 8

When using CodeQL, how does extraction for compiled languages work?

A.

By generating one language at a time

B.

By resolving dependencies to give an accurate representation of the codebase

C.

By monitoring the normal build process

D.

By running directly on the source code

Full Access
Question # 9

Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)​

A.

It generates a Dependabot alert and displays it on the Security tab for the repository.

B.

It notifies the repository administrators about the new alert.

C.

It generates Dependabot alerts by default for all private repositories.

D.

It consults with a security service and conducts a thorough vulnerability review.​

Full Access
Question # 10

What is the first step you should take to fix an alert in secret scanning?

A.

Archive the repository.

B.

Update your dependencies.

C.

Revoke the alert if the secret is still valid.

D.

Remove the secret in a commit to the main branch.

Full Access
Question # 11

If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?

A.

Users with Write permissions to the repository

B.

Users with Admin privileges to the repository

C.

Users with Maintain privileges to the repository

D.

Users with Read permissions to the repository

Full Access
Question # 12

Which of the following options would close a Dependabot alert?

A.

Creating a pull request to resolve the vulnerability that will be approved and merged

B.

Viewing the Dependabot alert on the Dependabot alerts tab of your repository

C.

Viewing the dependency graph

D.

Leaving the repository in its current state

Full Access
Question # 13

Where can you view code scanning results from CodeQL analysis?

A.

The repository's code scanning alerts

B.

A CodeQL database

C.

A CodeQL query pack

D.

At Security advisories

Full Access
Question # 14

What is required to trigger code scanning on a specified branch?

A.

The repository must be private.

B.

Secret scanning must be enabled on the repository.

C.

Developers must actively maintain the repository.

D.

The workflow file must exist in that branch.

Full Access
Question # 15

You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?​

A.

Show paths

B.

Security

C.

Code scanning alerts​

Full Access
Question # 16

Which CodeQL query suite provides queries of lower severity than the default query suite?

A.

github/codeql-go/ql/src@main

B.

github/codeql/cpp/ql/src@main

C.

security-extended

Full Access
Question # 17

What is a security policy?

A.

An automatic detection of security vulnerabilities and coding errors in new or modified code

B.

A security alert issued to a community in response to a vulnerability

C.

A file in a GitHub repository that provides instructions to users about how to report a security vulnerability

D.

An alert about dependencies that are known to contain security vulnerabilities

Full Access
Question # 18

Which of the following statements best describes secret scanning push protection?​

A.

Commits that contain secrets are blocked before code is added to the repository.

B.

Secret scanning alerts must be closed before a branch can be merged into the repository.

C.

Buttons for sensitive actions in the GitHub UI are disabled.

D.

Users need to reply to a 2FA challenge before any push events.​

Full Access
Question # 19

Which of the following formats are used to describe a Dependabot alert? (Each answer presents a complete solution. Choose two.)​

A.

Common Weakness Enumeration (CWE)

B.

Exploit Prediction Scoring System (EPSS)

C.

Common Vulnerabilities and Exposures (CVE)

D.

Vulnerability Exploitability exchange (VEX)​

Full Access
Question # 20

Which security feature shows a vulnerable dependency in a pull request?

A.

Dependency graph

B.

Dependency review

C.

Dependabot alert

D.

The repository's Security tab

Full Access
Question # 21

You are a maintainer of a repository and Dependabot notifies you of a vulnerability. Where could the vulnerability have been disclosed? (Each answer presents part of the solution. Choose two.)​

A.

In the National Vulnerability Database

B.

In the dependency graph

C.

In security advisories reported on GitHub

D.

In manifest and lock files

Full Access
Question # 22

Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)

A.

directory

B.

package-ecosystem

C.

milestone

D.

schedule.interval

E.

allow

Full Access