New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil ECDE 312-97 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

(Patrick Fisher is a DevSecOps engineer in an IT company that develops software products and web applications. He is using IAST to analyze code for security vulnerabilities and to view real-time reports of the security issues. Patrick is using IAST in development, QA, and production stages to detect the vulnerabilities from the early stage of development, reduce the remediation cost, and keep the application secure. How can IAST perform SAST on every line of code and DAST on every request and response?.)

Options:

A.

Because IAST has access to server and local machine.


B.

Because IAST has access to the code and HTTP traffic.


C.

Because IAST has access to offline and runtime environment.


D.

Because IAST has access to internal and external agents.


Expert Solution
Questions # 22:

(SinCaire is a software development company that develops web applications for various clients. To measure the successful implementation of DevSecOps, the organization enforced U.S. General Service Administrator (GSA) high-value DevSecOps metrics. Which of the following metrics implemented by SinCaire can measure the time between the code commit and production, and tracks the bug fix and new features throughout the development, testing, and production phases?)

Options:

A.

Mean time to recovery (for applications).


B.

Change volume (for application).


C.

Time to value.


D.

Change lead time (for application).


Expert Solution
Questions # 23:

(Allen Smith has been working as a senior DevSecOps engineer for the past 4 years in an IT company that develops software products and applications for retail companies. To detect common security issues in the source code, he would like to integrate Bandit SAST tool with Jenkins. Allen installed Bandit and created a Jenkins job. In the Source Code Management section, he provided repository URL, credentials, and the branch that he wants to analyze. As Bandit is installed on Jenkins' server, he selected Execute shell for the Build step and configure Bandit script. After successfully integrating Bandit SAST tool with Jenkins, in which of the following can Allen detect security issues?.)

Options:

A.

Java code.


B.

Ruby code.


C.

Python code.


D.

C++ code.


Expert Solution
Questions # 24:

(DWART is an IT company that develops cyber security software and web applications. The organization ensures that all users should be identified and authorized, enforces proper auditing, secures data at rest, ensures that the attacker cannot bypass the security layers, implements multiple layers of defense, maintains proper data integrity, and performs proper input validation for the application. Based on the above-mentioned information, which of the following secure coding principles is achieved by DWART?.)

Options:

A.

Secure by design.


B.

Secure by implementation.


C.

Secure by default.


D.

Secure by communication.


Expert Solution
Questions # 25:

(Steven Smith has been working as a DevSecOps engineer in an IT company that develops software products related to the financial sector. His team leader asked him to integrate Conjur with Jenkins to secure the secret credentials. Therefore, Steven downloaded Conjur.hpi file and uploaded it in the Upload Plugin section of Jenkins. He declared host and layers, and declared the variables. Which of the following commands should Steven use to set the value of variables?)

Options:

A.

$ conjur variable set -i < policy-path-of-variable-name > -v < secret-value >.


B.

$ conjur variable set -p < policy-path-of-variable-name > -s < secret-value >.


C.

$ conjur variable set -s < policy-path-of-variable-name > -p < secret-value >.


D.

$ conjur variable set -v < policy-path-of-variable-name > -i < secret-value >.


Expert Solution
Questions # 26:

(Paul McCartney has been working as a senior DevSecOps engineer in an IT company over the past 5 years. He would like to integrate Conjur secret management tool into the CI/CD pipeline to secure the secret credentials in various phases of development. To integrate Conjur with Jenkins, Paul downloaded Conjur.hpi file and uploaded it to the Upload Plugin section of Jenkins. Paul declared a policy branch using a code and saved it as a .yml file. Which of the following commands should Paul use to load this policy in Conjur root?)

Options:

A.

$ conjur policy load -f root -p < file-name >.


B.

$ conjur policy load -f root -b < file-name >.


C.

$ conjur policy load -p root -f < file-name >.


D.

$ conjur policy load -b root -f < file-name >.


Expert Solution
Questions # 27:

(William Scott, after completing his graduation in computer science, joined an IT company as a DevSecOps engineer. His team leader has asked him to use GitHub Code Scanning for evaluating the source code in his organization’s GitHub repository to detect security issues and coding errors. How can William set up coding scanning in GitHub repository?)

Options:

A.

By using Gauntlt.


B.

By using GitMiner.


C.

By using OWASP ZAP.


D.

By using CodeQL.


Expert Solution
Questions # 28:

(Lisa Kramer carries an experience of 4 years as a DevSecOps engineer in an IT company. The software development team of her organization has developed a Ruby on Rails web application and would like to find vulnerabilities in Ruby dependencies. Therefore, the team leader of the software development team approached Lisa for help in this regard. Which of the following SCA tool should Lisa use to detect vulnerabilities in Ruby dependencies?)

Options:

A.

Bandit.


B.

Bundler-Audit.


C.

Retire.js.


D.

Tenable.io.


Expert Solution
Questions # 29:

(Timothy Dalton has been working as a senior DevSecOps engineer in an IT company located in Auburn, New York. He would like to use Jenkins for CI and Azure Pipelines for CD to deploy a Java-based app to an Azure Container Service (AKS) Kubernetes cluster. Before deploying Azure Kubernetes Service (AKS) Cluster, Timothy wants to create a Resource group named Jenkins in southindia location. Which of the following commands should Timothy run?.)

Options:

A.

az group create --name Jenkins --location southindia.


B.

az grp create --n Jenkins --loc southindia.


C.

azure group create --name Jenkins --location southindia.


D.

azure group create --n Jenkins --loc southindia.


Expert Solution
Questions # 30:

(Jason Barry has been working as a DevSecOps engineer in an IT company that develops software products and applications for ecommerce companies. During the build-time check, Jason discovered SQL injection and XXS security issues in the application code. What action does the build-time check perform on the application code?.)

Options:

A.

It will ignore the security issue and continue the build process.


B.

It will send a message to issue and project management tool and continue with deploy-time check.


C.

It will send an alert to SIEM and continue with test-time check.


D.

It will stop the build process.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions