Pass the GitHub GitHub Certification GitHub-Advanced-Security Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

Options:

A.

Dependabot reviews manifest files in the repository


B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies


C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisorydatabase


D.

The build tool finds the vulnerable dependencies and calls the Dependabot API


Expert Solution
Questions # 2:

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

Options:

A.

support.md


B.

readme.md


C.

contributing.md


D.

security.md


Expert Solution
Questions # 3:

Where can you view code scanning results from CodeQL analysis?

Options:

A.

The repository's code scanning alerts


B.

A CodeQL database


C.

A CodeQL query pack


D.

At Security advisories


Expert Solution
Questions # 4:

Who can fix a code scanning alert on a private repository?​

Options:

A.

Users who have the Triage role within the repository


B.

Users who have Read permissions within the repository


C.

Users who have Write access to the repository


D.

Users who have the security manager role within the repository​


Expert Solution
Questions # 5:

Which of the following options would close a Dependabot alert?

Options:

A.

Creating a pull request to resolve the vulnerability that will be approved and merged


B.

Viewing the Dependabot alert on the Dependabot alerts tab of your repository


C.

Viewing the dependency graph


D.

Leaving the repository in its current state


Expert Solution
Questions # 6:

A repository's dependency graph includes:

Options:

A.

Dependencies parsed from a repository's manifest and lock files.


B.

Annotated code scanning alerts from your repository's dependencies.


C.

A summary of the dependencies used in your organization's repositories.


D.

Dependencies from all your repositories.


Expert Solution
Questions # 7:

Which of the following workflow events would trigger a dependency review? (Each answer presents a complete solution. Choose two.)​

Options:

A.

pull_request


B.

workflow_dispatch


C.

trigger


D.

commit


Expert Solution
Questions # 8:

Which of the following tasks can be performed by a security team as a proactive measure to help address secret scanning alerts? (Each answer presents a complete solution. Choose two.)

Options:

A.

Dismiss alerts that are older than 90 days.


B.

Configure a webhook to monitor for secret scanning alert events.


C.

Enable system for cross-domain identity management (SCIM) provisioning for the enterprise.


D.

Document alternatives to storing secrets in the source code.


Expert Solution
Questions # 9:

A secret scanning alert should be closed as "used in tests" when a secret is:

Options:

A.

In the readme.md file.


B.

In a test file.


C.

Solely used for tests.


D.

Not a secret in the production environment.


Expert Solution
Questions # 10:

What does a CodeQL database of your repository contain?​

Options:

A.

A build for Go projects to set up the project


B.

A build of the code and extracted data


C.

Build commands for C/C++, C#, and Java


D.

A representation of all of the source code​

GitHub

Agentic AI for AppSec Teams


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions