When using the advanced CodeQL code scanning setup, what is the name of the workflow file?
After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
What does code scanning do?
Which security feature shows a vulnerable dependency in a pull request?
Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
When secret scanning detects a set of credentials on a public repository, what does GitHub do?
Which of the following information can be found in a repository's Security tab?
What does a CodeQL database of your repository contain?
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
When does Dependabot alert you of a vulnerability in your software development process?
How many alerts are created when two instances of the same secret value are in the same repository?
Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:
What is the first step you should take to fix an alert in secret scanning?
Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?
What kind of repository permissions do you need to request a Common Vulnerabilities and Exposures (CVE) identification number for a security advisory?
Which of the following workflow events would trigger a dependency review? (Each answer presents a complete solution. Choose two.)
Which of the following statements most accurately describes push protection for secret scanning custom patterns?
The autobuild step in the CodeQL workflow has failed. What should you do?
Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)
What role is required to change a repository's code scanning severity threshold that fails a pull request status check?