New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECDE 312-97 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

(Joyce Vincent has been working as a senior DevSecOps engineer at MazeSoft Solution Pvt. Ltd. She would like to integrate Trend Micro Cloud One RASP tool with Microsoft Azure to secure container-based application by inspecting the traffic, detecting vulnerabilities, and preventing threats. In Microsoft Azure PowerShell, Joyce created the Azure container instance in a resource group (ACI) (named “aci-test-closh”) and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Joyce use to get the logging information from the container?.)

Options:

A.

az container logs --resource-group ACI --name aci-test-closh.


B.

az container logs -resource-group ACI -name aci-test-closh.


C.

azure container logs --resource-group ACI --name aci-test-closh.


D.

azure container logs -resource-group ACI -name aci-test-closh.


Expert Solution
Questions # 2:

(Curtis Morgan is working as a DevSecOps engineer at Orchid Pvt. Ltd. His organization develops online teaching software. Beth McCarthy is working in a software development team, and she requested Curtis to help her in making pre-commit hooks executable on her local machine. Curtis went through the “repo.git\hooks” directory and removed the “.sample” extension from “pre-commit.sample” file by using “chmod +x filename” command and made the pre-commit hook executable on Beth’s local machine. On the next day while developing the code for the software product, Beth accidentally committed the code with sensitive information. What will be the result of this commit?.)

Options:

A.

The script will exit with 3.


B.

The script will exit with 0.


C.

The script will exit with 2.


D.

The script will exit with 1.


Expert Solution
Questions # 3:

(Kevin Ryan has been working as a DevSecOps engineer in an MNC company that develops various software products and web applications. For easy management of secret credentials in CI/CD pipeline, he would like to integrate Azure Key Vault with Jenkins. Therefore, he created an Azure Key Vault, noted down the credentials displayed on the screen, and created a secret in Azure Key Vault. Then, he used the secret key from the credentials obtained from creating the vault. Kevin went back to Jenkins and installed Azure Key Vault plugin. Then, he navigated to Configure System under Manage Jenkins and added the URL for Azure Key Vault. How can Kevin complete the integration of Azure Key Vault with Jenkins?.)

Options:

A.

By modifying old credentials in Global Credentials (unrestricted).


B.

By creating new credentials in Global Credentials (unrestricted).


C.

By creating new credentials in Global Credentials (restricted).


D.

By modifying old credentials in Global Credentials (restricted).


Expert Solution
Questions # 4:

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:

A.

$ go get github.com/michenriksen/gitrob.


B.

$ go get gitrob github.com/michenriksen/gitrob.


C.

$ go git github.com/michenriksen/gitrob.


D.

$ go git gitrob github.com/michenriksen/gitrob.


Expert Solution
Questions # 5:

(Kevin Williamson is working as a DevSecOps engineer in an IT company located in Los Angles, California. His team has integrated Jira with Jenkins to view every issue on Jira, including the status of the latest build or successful deployment of the work to an environment. Which of the following can Kevin use to search issues on Jira?)

Options:

A.

Java query language.


B.

Structured query language.


C.

Atlassian query language.


D.

Jira query language.


Expert Solution
Questions # 6:

(Orange International Pvt. Ltd. is an IT company that develops software products and web applications for Android phones. The organization recognizes the importance of secure coding principles and would like to enforce it. Therefore, Orange International Pvt. Ltd. established access management, avoided reinventing the wheel, secured the weak links, implemented in-depth defense, and reduced third-party involvement in the application. Based on the above-mentioned information, which of the following secure coding principles is achieved by the organization?.)

Options:

A.

Secure by implementation.


B.

Secure by default.


C.

Secure by design.


D.

Secure by communication.


Expert Solution
Questions # 7:

(Brett Ryan has been working as a senior DevSecOps engineer in an IT company in Charleston, South Carolina. He is using git-mutimail tool to send email notification for every push to git repository. By default, the tool will send one output email providing details about the reference change and one output email for every new commit due to a reference change. How can Brett ensure that git-multimail is set up appropriately?)

Options:

A.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.


B.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to empty string.


C.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.


D.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to empty string.


Expert Solution
Questions # 8:

(Sandra Oliver joined SinClare Soft Pvt. Ltd. as a DevSecOps engineer in January of 2010. Her organization develops software and web applications related to the healthcare industry. Using IAST runtime security testing technology, she is detecting and diagnosing security issues in applications and APIs. The IAST solution used by Sandra encompasses a web scanner with an agent that works inside the server that hosts the application to provide additional analysis details such as the location of the vulnerability in the application code. Based on the given information, which of the following IAST solutions is Sandra using?)

Options:

A.

Active IAST.


B.

Semi-passive IAST.


C.

Semi-active IAST.


D.

Passive IAST.


Expert Solution
Questions # 9:

(Alex Hales has been working as a DevSecOps in an IT company that develops software products and web applications for visualizing scientific data. He would like to trigger a Jenkins build job using Git post commit script or hooks that helps his team in saving time by automating commit. Therefore, before triggering the build job, Alex made changes and saved the code in the respective IDE under Git repository and added the changes in the master branch using git add command and ran the post commit script to check the status of the build. Then, he navigated to the Jenkins project and selected the “Trigger build remotely from Build triggers” radio button. It would automate the trigger every time a change gets committed to the project. Alex navigated back to Bash terminal to trigger the build job. Which of the following commands should Alex use in Bash terminal to trigger the build job?)

Options:

A.

git commit -m “commit from terminal”.


B.

github commit -b “commit from terminal”.


C.

github commit -m “commit from terminal”.


D.

git commit -b “commit from terminal”.


Expert Solution
Questions # 10:

(Debra Aniston has recently joined an MNC company as a DevSecOps engineer. Her organization develops various types of software products and web applications. The DevSecOps team leader provided an application code and asked Debra to detect and mitigate security issues. Debra used w3af tool and detected cross-site scripting and SQL injection vulnerability in the source code. Based on this information, which category of security testing tools is represented by w3af?.)

Options:

A.

IAST.


B.

SCA.


C.

DAST.


D.

SAST.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions