Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

GitHub GitHub-Advanced-Security Dumps

GitHub Advanced Security GHAS Exam Questions and Answers

Question 1

When using the advanced CodeQL code scanning setup, what is the name of the workflow file?​

Options:

A.

codeql-config.yml

B.

codeql-scan.yml

C.

codeql-workflow.yml

D.

codeql-analysis.yml

Question 2

The autobuild step in the CodeQL workflow has failed. What should you do?

Options:

A.

Remove specific build steps.

B.

Compile the source code.

C.

Remove the autobuild step from your code scanning workflow and add specific build steps.

D.

Use CodeQL, which implicitly detects the supported languages in your code base.

Question 3

When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)

Options:

A.

Packs

B.

github/codeql

C.

Scope

D.

Queries

Question 4

Which of the following options would close a Dependabot alert?

Options:

A.

Creating a pull request to resolve the vulnerability that will be approved and merged

B.

Viewing the Dependabot alert on the Dependabot alerts tab of your repository

C.

Viewing the dependency graph

D.

Leaving the repository in its current state

Question 5

How would you build your code within the CodeQL analysis workflow? (Each answer presents a complete solution. Choose two.)​

Options:

A.

Upload compiled binaries.

B.

Use CodeQL's init action.

C.

Ignore paths.

D.

Implement custom build steps.

E.

Use jobs.analyze.runs-on.

F.

Use CodeQL's autobuild action.

Question 6

What is the first step you should take to fix an alert in secret scanning?

Options:

A.

Archive the repository.

B.

Update your dependencies.

C.

Revoke the alert if the secret is still valid.

D.

Remove the secret in a commit to the main branch.

Question 7

Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?

Options:

A.

Non-provider patterns

B.

Push protection

C.

Custom pattern dry runs

D.

Secret validation

Question 8

What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?​

Options:

A.

Update the workflow to include a final step that uploads the results.

B.

By default, the CodeQL runner automatically uploads results to GitHub on completion.

C.

The CodeQL action uploads the SARIF file automatically when it completes analysis.

D.

Use the CLI to upload results to GitHub.​

Question 9

Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?​

Options:

A.

An enterprise administrator

B.

A user who has write access to the repository

C.

A user who has read access to the repository

D.

A repository member of an enterprise organization​

Question 10

What YAML syntax do you use to exclude certain files from secret scanning?

Options:

A.

decrypt_secret.sh

B.

paths-ignore:

C.

branches-ignore:

D.

secret scanning.yml

Question 11

When using CodeQL, what extension stores query suite definitions?

Options:

A.

.yml

B.

.ql

C.

.qll

D.

.qls

Question 12

What does code scanning do?

Options:

A.

It contacts maintainers to ask them to create security advisories if a vulnerability is found

B.

It prevents code pushes with vulnerabilities as a pre-receive hook

C.

It analyzes a GitHub repository to find security vulnerabilities

D.

It scans your entire Git history on branches present in your GitHub repository for any secrets

Question 13

Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?

Options:

A.

Enable all in existing repositories

B.

Enable by default for new public repositories

C.

Enable all for Dependabot alerts

D.

Enable all for Dependency graph

Question 14

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

Options:

A.

support.md

B.

readme.md

C.

contributing.md

D.

security.md

Question 15

When using CodeQL, how does extraction for compiled languages work?

Options:

A.

By generating one language at a time

B.

By resolving dependencies to give an accurate representation of the codebase

C.

By monitoring the normal build process

D.

By running directly on the source code

Question 16

Which details do you have to provide to create a custom pattern for secret scanning? (Each answer presents part of the solution. Choose two.)

Options:

A.

The secret format

B.

The name of the pattern

C.

A list of repositories to scan

D.

Additional match requirements for the secret format

Question 17

How many alerts are created when two instances of the same secret value are in the same repository?

Options:

A.

1

B.

2

C.

3

D.

4

Question 18

Which of the following workflow events would trigger a dependency review? (Each answer presents a complete solution. Choose two.)​

Options:

A.

pull_request

B.

workflow_dispatch

C.

trigger

D.

commit

Question 19

What role is required to change a repository's code scanning severity threshold that fails a pull request status check?

Options:

A.

Maintain

B.

Write

C.

Triage

D.

Admin

Question 20

What is a security policy?

Options:

A.

An automatic detection of security vulnerabilities and coding errors in new or modified code

B.

A security alert issued to a community in response to a vulnerability

C.

A file in a GitHub repository that provides instructions to users about how to report a security vulnerability

D.

An alert about dependencies that are known to contain security vulnerabilities

Question 21

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

Options:

A.

Dependabot reviews manifest files in the repository

B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies

C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisorydatabase

D.

The build tool finds the vulnerable dependencies and calls the Dependabot API

Question 22

If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?

Options:

A.

Users with Write permissions to the repository

B.

Users with Admin privileges to the repository

C.

Users with Maintain privileges to the repository

D.

Users with Read permissions to the repository

Page: 1 / 8
Total 75 questions