New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECDE 312-97 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

(Peter Dinklage has been working as a senior DevSecOps engineer at SacramentSoft Solution Pvt. Ltd. He has deployed applications in docker containers. His team leader asked him to check the exposure of unnecessary ports. Which of the following commands should Peter use to check all the containers and the exposed ports?)

Options:

A.

docker ps --quiet | xargs docker inspect --all --format : Ports=.


B.

docker ps --quiet | xargs docker inspect --format ': Ports='.


C.

docker ps --quiet | xargs docker inspect --format : Ports.


D.

docker ps --quiet | xargs docker inspect --all --format ': Ports='.


Expert Solution
Questions # 12:

(Elizabeth Moss has been working as a DevSecOps engineer in an IT company located in San Diego, California. Due to the robust security and cost-effective service provided by AWS, her organization transferred all the workloads from on-prem to AWS cloud in 2017. Elizabeth would like to prevent committing AWS keys into repositories; therefore, she created a global git-templates directory using command line. Then, she created another directory, named it as hooks, wherein she created a file named pre-commit. In the pre-commit file, Elizabeth pasted the script that would prevent committing AWS keys into the repositories. She would like to ensure that the hook is executable. Which of the following command should Elizabeth run to make sure that the pre-commit hook is executable?)

Options:

A.

chmod a+x ~/.git-templates/hooks/pre-commit.


B.

chmod a+e ~/.git-templates/hooks/pre-commit.


C.

chmod a+x ~/.hooks/git-templates/pre-commit.


D.

chmod a+e ~/.hooks/git-templates/pre-commit.


Expert Solution
Questions # 13:

(Craig Kelly has been working as a software development team leader in an IT company over the past 8 years. His team is working on the development of an Android application product. Sandra Oliver, a DevSecOps engineer, used DAST tools and fuzz testing to perform advanced checks on the Android application product and detected critical and high severity issues. She provided the information about the security issues and the recommendations to mitigate them to Craig’s team. Which type of security checks performed by Sandra involve detection of critical and high severity issues using DAST tools and fuzz testing?)

Options:

A.

Commit-time checks.


B.

Build-time checks.


C.

Deploy-time checks.


D.

Test-time checks.


Expert Solution
Questions # 14:

(Kevin Williamson has been working as a DevSecOps engineer in an MNC company for the past 5 years. In January of 2017, his organization migrated all the applications and data from on-prem to AWS cloud due to the robust security feature and cost-effective services provided by Amazon. His organization is using Amazon DevOps services to develop software products securely and quickly. To detect errors in the code and to catch bugs in the application code, Kevin integrated PHPStan into the AWS pipeline for static code analysis. What will happen if security issues are detected in the application code?.)

Options:

A.

The integrated PHPStan into the AWS pipeline will invoke AWS CloudFormation to parse and send result to the security hub.


B.

The integrated PHPStan into the AWS pipeline will invoke AWS Config to parse and send result to the security hub.


C.

The integrated PHPStan into the AWS pipeline will invoke AWS Elastic BeanStalk to parse and send result to the security hub.


D.

The integrated PHPStan into the AWS pipeline will invoke the AWS Lambda function to parse and send result to the security hub.


Expert Solution
Questions # 15:

(Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL,https://github.com/continuumsecurity/bdd-security.git . Which of the following command should Gabriel use to clone the BBD security framework?)

Options:

A.

github clonehttps://github.com/continumsecurity/bdd-security.git .


B.

git clonehttps://github.com/continuumsecurity/bdd-security.git .


C.

git clonehttps://github.com/continumsecurity/bdd-security.git .


D.

github clonehttps://github.com/continuumsecurity/bdd-security.git .


Expert Solution
Questions # 16:

(Teresa Wheeler is a DevSecOps engineer at Altschutz Solution Pvt. Ltd. She would like to test the web applications and API’s from outside without accessing the source code using BDD security framework. The framework is a collection of Cucumber-JVM features that are pre-configured with OWASP ZAP, Nessus scanner, SSLyze, and Selenium. Hence, she downloaded and ran the jar application, and then cloned the BDD security framework. Next, she utilized a command for executing the authentication feature. Which of the following commands allows Teresa to execute all the features of BDD security framework, including the OWASP ZAP?.)

Options:

A.

./gardlew.


B.

/gardlev.


C.

/gardlew.


D.

./gardlev.


Expert Solution
Questions # 17:

(Christopher Brown has been working as a DevSecOps engineer in an IT company that develops software and web applications for an ecommerce company. To automatically detect common security issues and coding error in the C++ code, she performed code scanning using CodeQL in GitHub. Which of the following entries will Christopher find for CodeQL analysis of C++ code?)

Options:

A.

CodeQL/Analyze (cp) (pull-request).


B.

CodeQL/Analyze (cp) (push-request).


C.

CodeQL/Analyze (cpp) (push-request).


D.

CodeQL/Analyze (cpp) (pull-request).


Expert Solution
Questions # 18:

(Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?)

Options:

A.

enable vault auth approle.


B.

auth vault enable approle.


C.

vault auth enable approle.


D.

enable auth vault approle.


Expert Solution
Questions # 19:

(Sarah Wright has recently joined a multinational company as a DevSecOps engineer. She has created a container and deployed a web application in it. Sarah would like to stop this container. Which of the following commands stop the running container created by Sarah Wright?)

Options:

A.

[root@574bac18f89d /]# kill.


B.

[root@574bac18f89d /]# exit.


C.

[root@574bac18f89d /]# clear.


D.

[root@574bac18f89d /]# stop.


Expert Solution
Questions # 20:

(Nicholas Cascone has recently been recruited by an IT company from his college as a DevSecOps engineer. His team leader asked him to integrate GitHub Webhooks with Jenkins. To integrate GitHub Webhooks with Jenkins, Nicholas logged in to GitHub account; he then selected Settings > Webhooks > Add Webhook. In the Payload URL field, he is supposed to add Jenkins URL. Which of the following is the final Jenkins URL format that Nicholas should add in Payload URL field of GitHub to configure GitHub Webhooks with Jenkins?.)

Options:

A.

http://address:port/GiHhub-webhook/ .


B.

http://address:port/github_webhook/ .


C.

http://address:port/github-webhook/ .


D.

http://address:port/GitHub.webhook/ .


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions