Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Microsoft GH-500 GitHub Advanced Security Exam Exam Practice Test

Page: 1 / 8
Total 75 questions

GitHub Advanced Security Exam Questions and Answers

Question 1

When using the advanced CodeQL code scanning setup, what is the name of the workflow file?​

Options:

A.

codeql-config.yml

B.

codeql-scan.yml

C.

codeql-workflow.yml

D.

codeql-analysis.yml

Question 2

After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?

Options:

A.

Draft a pull request to update the open-source query.

B.

Ignore the alert.

C.

Open an issue in the CodeQL repository.

D.

Dismiss the alert with the reason "false positive."

Question 3

When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)

Options:

A.

Packs

B.

github/codeql

C.

Scope

D.

Queries

Question 4

If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?

Options:

A.

Users with Write permissions to the repository

B.

Users with Admin privileges to the repository

C.

Users with Maintain privileges to the repository

D.

Users with Read permissions to the repository

Question 5

What does code scanning do?

Options:

A.

It contacts maintainers to ask them to create security advisories if a vulnerability is found

B.

It prevents code pushes with vulnerabilities as a pre-receive hook

C.

It analyzes a GitHub repository to find security vulnerabilities

D.

It scans your entire Git history on branches present in your GitHub repository for any secrets

Question 6

Which security feature shows a vulnerable dependency in a pull request?

Options:

A.

Dependency graph

B.

Dependency review

C.

Dependabot alert

D.

The repository's Security tab

Question 7

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

Options:

A.

Dependabot reviews manifest files in the repository

B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies

C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisory database

D.

The build tool finds the vulnerable dependencies and calls the Dependabot API

Question 8

When secret scanning detects a set of credentials on a public repository, what does GitHub do?

Options:

A.

It notifies the service provider who issued the secret.

B.

It displays a public alert in the Security tab of the repository.

C.

It scans the contents of the commits for additional secrets.

D.

It sends a notification to repository members.

Question 9

Which of the following information can be found in a repository's Security tab?

Options:

A.

Number of alerts per GHAS feature

B.

Two-factor authentication (2FA) options

C.

Access management

D.

GHAS settings

Question 10

What does a CodeQL database of your repository contain?​

Options:

A.

A build for Go projects to set up the project

B.

A build of the code and extracted data

C.

Build commands for C/C++, C#, and Java

D.

A representation of all of the source code​

GitHub

Agentic AI for AppSec Teams

Question 11

If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?

Options:

A.

Repositories owned by an enterprise account

B.

Private repositories

C.

None

D.

Repositories owned by an organization

Question 12

When does Dependabot alert you of a vulnerability in your software development process?

Options:

A.

When a pull request adding a vulnerable dependency is opened

B.

As soon as a vulnerable dependency is detected

C.

As soon as a pull request is opened by a contributor

D.

When Dependabot opens a pull request to update a vulnerable dependency

Question 13

How many alerts are created when two instances of the same secret value are in the same repository?

Options:

A.

1

B.

2

C.

3

D.

4

Question 14

Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:

Options:

A.

Public repositories

B.

All new repositories within your organization

C.

User-owned private repositories

D.

Private repositories

Question 15

What is the first step you should take to fix an alert in secret scanning?

Options:

A.

Archive the repository.

B.

Update your dependencies.

C.

Revoke the alert if the secret is still valid.

D.

Remove the secret in a commit to the main branch.

Question 16

Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?

Options:

A.

Non-provider patterns

B.

Push protection

C.

Custom pattern dry runs

D.

Secret validation

Question 17

What kind of repository permissions do you need to request a Common Vulnerabilities and Exposures (CVE) identification number for a security advisory?​

Options:

A.

Maintain

B.

Admin

C.

Triage

D.

Write​

Question 18

Which of the following workflow events would trigger a dependency review? (Each answer presents a complete solution. Choose two.)​

Options:

A.

pull_request

B.

workflow_dispatch

C.

trigger

D.

commit

Question 19

Which of the following statements most accurately describes push protection for secret scanning custom patterns?​

Options:

A.

Push protection must be enabled for all, or none, of a repository's custom patterns.

B.

Push protection is an opt-in experience for each custom pattern.

C.

Push protection is not available for custom patterns.

D.

Push protection is enabled by default for new custom patterns.​

Question 20

The autobuild step in the CodeQL workflow has failed. What should you do?

Options:

A.

Remove specific build steps.

B.

Compile the source code.

C.

Remove the autobuild step from your code scanning workflow and add specific build steps.

D.

Use CodeQL, which implicitly detects the supported languages in your code base.

Question 21

Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)​

Options:

A.

It generates a Dependabot alert and displays it on the Security tab for the repository.

B.

It notifies the repository administrators about the new alert.

C.

It generates Dependabot alerts by default for all private repositories.

D.

It consults with a security service and conducts a thorough vulnerability review.​

Question 22

What role is required to change a repository's code scanning severity threshold that fails a pull request status check?

Options:

A.

Maintain

B.

Write

C.

Triage

D.

Admin

Page: 1 / 8
Total 75 questions