Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium GitHub GitHub-Advanced-Security Dumps Questions Answers

GitHub Advanced Security GHAS Exam Questions and Answers

Question 1

Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)

Options:

A.

In a third-party Git repository

B.

In a workflow

C.

In an external continuous integration (CI) system

D.

In the Files changed tab of the pull request

Buy Now
Question 2

What is a prerequisite to define a custom pattern for a repository?

Options:

A.

Change the repository visibility to Internal

B.

Close other secret scanning alerts

C.

Specify additional match criteria

D.

Enable secret scanning

Question 3

What is the first step you should take to fix an alert in secret scanning?

Options:

A.

Archive the repository.

B.

Update your dependencies.

C.

Revoke the alert if the secret is still valid.

D.

Remove the secret in a commit to the main branch.

Question 4

How would you build your code within the CodeQL analysis workflow? (Each answer presents a complete solution. Choose two.)​

Options:

A.

Upload compiled binaries.

B.

Use CodeQL's init action.

C.

Ignore paths.

D.

Implement custom build steps.

E.

Use jobs.analyze.runs-on.

F.

Use CodeQL's autobuild action.

Question 5

Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?

Options:

A.

Enable all in existing repositories

B.

Enable by default for new public repositories

C.

Enable all for Dependabot alerts

D.

Enable all for Dependency graph

Question 6

When does Dependabot alert you of a vulnerability in your software development process?

Options:

A.

When a pull request adding a vulnerable dependency is opened

B.

As soon as a vulnerable dependency is detected

C.

As soon as a pull request is opened by a contributor

D.

When Dependabot opens a pull request to update a vulnerable dependency

Question 7

What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?​

Options:

A.

Update the workflow to include a final step that uploads the results.

B.

By default, the CodeQL runner automatically uploads results to GitHub on completion.

C.

The CodeQL action uploads the SARIF file automatically when it completes analysis.

D.

Use the CLI to upload results to GitHub.​

Question 8

What YAML syntax do you use to exclude certain files from secret scanning?

Options:

A.

decrypt_secret.sh

B.

paths-ignore:

C.

branches-ignore:

D.

secret scanning.yml

Question 9

Secret scanning will scan:​

Options:

A.

A continuous integration system.

B.

Any Git repository.

C.

The GitHub repository.

D.

External services.​

Question 10

Which alerts do you see in the repository's Security tab? (Each answer presents part of the solution. Choose three.)

Options:

A.

Repository permissions

B.

Secret scanning alerts

C.

Dependabot alerts

D.

Security status alerts

E.

Code scanning alerts

Question 11

How many alerts are created when two instances of the same secret value are in the same repository?

Options:

A.

1

B.

2

C.

3

D.

4

Question 12

What happens when you enable secret scanning on a private repository?

Options:

A.

Repository administrators can view Dependabot alerts.

B.

Your team is subscribed to security alerts.

C.

GitHub performs a read-only analysis on the repository.

D.

Dependency review, secret scanning, and code scanning are enabled.

Question 13

Which key is required in the update settings of the Dependabot configuration file?

Options:

A.

rebase-strategy

B.

commit-message

C.

assignees

D.

package-ecosystem

Question 14

Where can you find a deleted line of code that contained a secret value?

Options:

A.

Insights

B.

Issues

C.

Commits

D.

Dependency graph

Question 15

Where can you view code scanning results from CodeQL analysis?

Options:

A.

The repository's code scanning alerts

B.

A CodeQL database

C.

A CodeQL query pack

D.

At Security advisories

Question 16

Which of the following statements most accurately describes push protection for secret scanning custom patterns?​

Options:

A.

Push protection must be enabled for all, or none, of a repository's custom patterns.

B.

Push protection is an opt-in experience for each custom pattern.

C.

Push protection is not available for custom patterns.

D.

Push protection is enabled by default for new custom patterns.​

Question 17

What is required to trigger code scanning on a specified branch?

Options:

A.

The repository must be private.

B.

Secret scanning must be enabled on the repository.

C.

Developers must actively maintain the repository.

D.

The workflow file must exist in that branch.

Question 18

What are Dependabot security updates?

Options:

A.

Automated pull requests that help you update dependencies that have known vulnerabilities

B.

Automated pull requests that keep your dependencies updated, even when they don’t have any vulnerabilities

C.

Automated pull requests to update the manifest to the latest version of the dependency

D.

Compatibility scores to let you know whether updating a dependency could cause breaking changes to your project

Question 19

What do you need to do before you can define a custom pattern for a repository?​

Options:

A.

Provide a regular expression for the format of your secret pattern.

B.

Add a secret scanning custom pattern.

C.

Enable secret scanning on the repository.

D.

Provide match requirements for the secret format.​

Stack Overflow

Question 20

As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?

Options:

A.

Write

B.

None

C.

Admin

D.

Read

Question 21

Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?​

Options:

A.

An enterprise administrator

B.

A user who has write access to the repository

C.

A user who has read access to the repository

D.

A repository member of an enterprise organization​

Question 22

Which patterns are secret scanning validity checks available to?

Options:

A.

High entropy strings

B.

Custom patterns

C.

Partner patterns

D.

Push protection patterns